INFO: task kworker/1:2:697 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:697 tgid:697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e00e9d84 r8:00000002 r7:60000013 r6:e00e9d8c r5:83311800 r4:83311800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83311800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83311800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577c38c r4:8577c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577c38c r4:832d1480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83311800 r8:832d14ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832d1480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832d1480 r8:8027ecf4 r7:df879e60 r6:83bc9300 r5:83311800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e9fb0 to 0xe00e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:832d0e40 INFO: task kworker/1:2:697 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bb9f8000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:3:1785 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:1785 tgid:1785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:842abc00 r4:842abc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842abc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e38c r4:8577e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577e38c r4:8423b780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842abc00 r8:8423b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8423b780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8423b780 r8:8027ecf4 r7:df985e60 r6:83bd2180 r5:842abc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8423f300 INFO: task kworker/1:3:1785 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bb9f8000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:3:2883 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:2883 tgid:2883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec58dd84 r8:00000002 r7:60000013 r6:ec58dd8c r5:83aa3c00 r4:83aa3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858b2980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f19f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed60d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d92b8c r4:85d92800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d92b8c r4:84548180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa3c00 r8:845481ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84548180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84548180 r8:8027ecf4 r7:df845e60 r6:84548200 r5:83aa3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84546840 INFO: task kworker/0:3:2883 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc1af000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:0:3095 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3095 tgid:3095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9a9d84 r8:00000002 r7:60000013 r6:df9a9d8c r5:84288c00 r4:84288c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84288c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9a9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509e38c r4:8509e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509e38c r4:8475df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:8475df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475df00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475df00 r8:8027ecf4 r7:eb101e60 r6:84398180 r5:84288c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9a9fb0 to 0xdf9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84747700 INFO: task kworker/1:0:3095 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc1af000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:6:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:8323e000 r4:8323e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8323e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb0b8c r4:84398780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:843987ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398780 r8:8027ecf4 r7:df9a1e60 r6:84398800 r5:8323e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a280 INFO: task kworker/0:6:3120 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc76b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:7:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e1d84 r8:00000002 r7:60000013 r6:df9e1d8c r5:83240000 r4:83240000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83240000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83240000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb238c r4:84398880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83240000 r8:843988ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398880 r8:8027ecf4 r7:df9d5e60 r6:84398900 r5:83240000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e1fb0 to 0xdf9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a080 INFO: task kworker/0:7:3122 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bc76b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:8:3123 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:83b3d400 r4:83b3d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b3d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502aa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b3d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb138c r4:84bb1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb138c r4:84398980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b3d400 r8:843989ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398980 r8:8027ecf4 r7:df9e1e60 r6:84398a00 r5:83b3d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9e5fb0 to 0xdf9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a5c0 INFO: task kworker/0:8:3123 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bcf73000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:9:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:842b8c00 r4:842b8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842b8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0731000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd1f8c r4:84bd1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd1f8c r4:84398a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842b8c00 r8:84398aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398a80 r8:8027ecf4 r7:df9e1e60 r6:8475da80 r5:842b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a5c0 INFO: task kworker/0:9:3125 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bcf73000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/0:10:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9b9d84 r8:00000002 r7:60000113 r6:df9b9d8c r5:842bd400 r4:842bd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842bd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850498c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df971000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cf8c r4:8511cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511cf8c r4:84398b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842bd400 r8:84398b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398b00 r8:8027ecf4 r7:dfa01e60 r6:8475d900 r5:842bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9b9fb0 to 0xdf9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474aa00 INFO: task kworker/0:10:3129 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bd77b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:1:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:842bec00 r4:842bec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842bec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:842bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518f78c r4:8518f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518f78c r4:8475d880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842bec00 r8:8475d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475d880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475d880 r8:8027ecf4 r7:eb101e60 r6:8475db00 r5:842bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d0c0 INFO: task kworker/1:1:3130 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bd77b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa25d84 r8:00000002 r7:60000013 r6:dfa25d8c r5:842be000 r4:842be000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842be000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ab00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842be000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd3f8c r4:84bd3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd3f8c r4:84398b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842be000 r8:84398bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398b80 r8:8027ecf4 r7:dfa01e60 r6:8475d980 r5:842be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ab40 INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bd77b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:842a8c00 r4:842a8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:842a8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:842a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccb8c r4:851cc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ccb8c r4:84398c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:842a8c00 r8:84398c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398c00 r8:8027ecf4 r7:dfa25e60 r6:84398c80 r5:842a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa31fb0 to 0xdfa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ac80 INFO: task kworker/0:12:3134 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bdf87000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:83b56000 r4:83b56000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b56000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506bf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b56000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cdb8c r4:851cd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851cdb8c r4:84398d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b56000 r8:84398d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398d00 r8:8027ecf4 r7:dfa31e60 r6:84398d80 r5:83b56000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ac80 INFO: task kworker/0:13:3135 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: beb92000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:4:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa45d84 r8:00000002 r7:60000113 r6:dfa45d8c r5:8428a400 r4:8428a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8428a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529b78c r4:8529b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529b78c r4:8475d400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428a400 r8:8475d42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475d400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475d400 r8:8027ecf4 r7:eb101e60 r6:84398e00 r5:8428a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d300 INFO: task kworker/1:4:3137 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bf24c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:83aa8c00 r4:83aa8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ffb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85112b8c r4:85112800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85112b8c r4:84398e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa8c00 r8:84398eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398e80 r8:8027ecf4 r7:dfa39e60 r6:84398f00 r5:83aa8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d140 INFO: task kworker/0:14:3140 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bf24c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83aac800 r4:83aac800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aac800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c8900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aac800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8498ff8c r4:8498fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8498ff8c r4:84398f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aac800 r8:84398fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84398f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398f80 r8:8027ecf4 r7:dfa41e60 r6:84398580 r5:83aac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d1c0 INFO: task kworker/0:15:3142 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bfaa3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3143 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:838b0000 r4:838b0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85355f8c r4:85355c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85355f8c r4:84398300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b0000 r8:8439832c r7:82804d40 r6:dddced40 r5:dddced60 r4:84398300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84398300 r8:8027ecf4 r7:dfa59e60 r6:84541d80 r5:838b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d340 INFO: task kworker/0:16:3143 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bfaa3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83a9c800 r4:83a9c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a9c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a9c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535638c r4:85356000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8535638c r4:83bd2380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9c800 r8:83bd23ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83bd2380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bd2380 r8:8027ecf4 r7:dfa0de60 r6:8475d780 r5:83a9c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d700 INFO: task kworker/0:17:3146 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bfc40000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:5:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa85d84 r8:00000002 r7:60000013 r6:dfa85d8c r5:84080000 r4:84080000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84080000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548df00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84080000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0535000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541eb8c r4:8541e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541eb8c r4:8475d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84080000 r8:8475d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475d700 r8:8027ecf4 r7:eb101e60 r6:8475d580 r5:84080000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa85fb0 to 0xdfa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d700 INFO: task kworker/1:5:3148 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bff97000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:83b3b000 r4:83b3b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b3b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440b8c r4:85440800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85440b8c r4:843a2000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b3b000 r8:843a202c r7:82804d40 r6:dddced40 r5:dddced60 r4:843a2000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843a2000 r8:8027ecf4 r7:dfa65e60 r6:8475da00 r5:83b3b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d780 INFO: task kworker/0:18:3150 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0382000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3151 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:838a3c00 r4:838a3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838a3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:838a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499038c r4:84990000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499038c r4:8410cd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a3c00 r8:8410cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8410cd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8410cd00 r8:8027ecf4 r7:dfa91e60 r6:8475d800 r5:838a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476d780 INFO: task kworker/0:19:3151 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c05ef000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3154 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa79d84 r8:00000002 r7:60000113 r6:dfa79d8c r5:8407d400 r4:8407d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8407d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb103000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545738c r4:85457000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545738c r4:8410cc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407d400 r8:8410ccac r7:82804d40 r6:dddced40 r5:dddced60 r4:8410cc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8410cc80 r8:8027ecf4 r7:dfa91e60 r6:8475df80 r5:8407d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476db80 INFO: task kworker/0:20:3154 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c05ef000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:8407a400 r4:8407a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8407a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fef8c r4:855fec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855fef8c r4:8475dd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407a400 r8:8475ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8475dd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8475dd80 r8:8027ecf4 r7:eb101e60 r6:8475dc80 r5:8407a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473da00 INFO: task kworker/1:6:3156 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0912000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3158 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3158 tgid:3158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfac1d84 r8:00000002 r7:60000013 r6:dfac1d8c r5:84079800 r4:84079800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84079800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847976c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84079800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457f8c r4:85457c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85457f8c r4:83358080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84079800 r8:833580ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83358080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358080 r8:8027ecf4 r7:dfa79e60 r6:8475dd00 r5:84079800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac1fb0 to 0xdfac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476db80 INFO: task kworker/0:21:3158 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0b8c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3160 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfacdd84 r8:00000002 r7:60000113 r6:dfacdd8c r5:8407bc00 r4:8407bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85693640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8407bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562d38c r4:8562d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562d38c r4:83358000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407bc00 r8:8335802c r7:82804d40 r6:dddced40 r5:dddced60 r4:83358000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358000 r8:8027ecf4 r7:dfac1e60 r6:84398600 r5:8407bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476ddc0 INFO: task kworker/0:22:3160 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0f53000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfab1d84 r8:00000002 r7:60000013 r6:dfab1d8c r5:84078c00 r4:84078c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84078c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85693bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84078c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562db8c r4:8562d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562db8c r4:838d3100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84078c00 r8:838d312c r7:82804d40 r6:dddced40 r5:dddced60 r4:838d3100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:838d3100 r8:8027ecf4 r7:dfacde60 r6:84548c00 r5:84078c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b100 INFO: task kworker/0:23:3163 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c115a000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaedd84 r8:00000002 r7:60000013 r6:dfaedd8c r5:8407c800 r4:8407c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8407c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb475000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577cb8c r4:8577c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577cb8c r4:830b8680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407c800 r8:830b86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830b8680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8680 r8:8027ecf4 r7:eb101e60 r6:830b8480 r5:8407c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473df00 INFO: task kworker/1:7:3164 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c148e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3166 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfaf1d84 r8:00000002 r7:60000113 r6:dfaf1d8c r5:83ab0000 r4:83ab0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562eb8c r4:8562e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562eb8c r4:830cd100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab0000 r8:830cd12c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ecf4 r7:dfab1e60 r6:830b8580 r5:83ab0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf1fb0 to 0xdfaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b200 INFO: task kworker/0:24:3166 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c175f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:83ab4800 r4:83ab4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a43c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb645000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562f38c r4:8562f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562f38c r4:830cd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab4800 r8:830cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027ecf4 r7:dfaf1e60 r6:830b8400 r5:83ab4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b100 INFO: task kworker/0:25:3168 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c18aa000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83ab6000 r4:83ab6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab6000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578738c r4:85787000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578738c r4:830cd280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab6000 r8:830cd2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027ecf4 r7:dfafde60 r6:832a1e80 r5:83ab6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b400 INFO: task kworker/0:26:3170 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c1b6d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb19d84 r8:00000002 r7:60000113 r6:dfb19d8c r5:83ab6c00 r4:83ab6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e0340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499238c r4:84992000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499238c r4:830cd080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab6c00 r8:830cd0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ecf4 r7:dfb0de60 r6:832a1200 r5:83ab6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b6c0 INFO: task kworker/0:27:3171 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c1e04000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb2dd84 r8:00000002 r7:60000013 r6:dfb2dd8c r5:83ab3c00 r4:83ab3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ab3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e0840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84992b8c r4:84992800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84992b8c r4:83c20000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab3c00 r8:83c2002c r7:82804d40 r6:dddced40 r5:dddced60 r4:83c20000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c20000 r8:8027ecf4 r7:dfb0de60 r6:832a1e00 r5:83ab3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b680 INFO: task kworker/0:28:3174 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c20dc000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb49d84 r8:00000002 r7:60000013 r6:dfb49d8c r5:83312400 r4:83312400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83312400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83312400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85863b8c r4:85863800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85863b8c r4:84735000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83312400 r8:8473502c r7:82804d40 r6:dddced40 r5:dddced60 r4:84735000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84735000 r8:8027ecf4 r7:dfb31e60 r6:83df9e80 r5:83312400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ba80 INFO: task kworker/0:30:3177 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c24e9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83315400 r4:83315400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83315400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83315400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577cf8c r4:8577cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577cf8c r4:84828000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83315400 r8:8482802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828000 r8:8027ecf4 r7:eb101e60 r6:84828100 r5:83315400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4900 INFO: task kworker/1:8:3182 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c24e9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:833a8000 r4:833a8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:833a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577d78c r4:8577d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577d78c r4:84828180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a8000 r8:848281ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828180 r8:8027ecf4 r7:eb101e60 r6:84828200 r5:833a8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4900 INFO: task kworker/1:9:3185 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2687000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3186 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:83aa2400 r4:83aa2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577df8c r4:8577dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577df8c r4:84828280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa2400 r8:848282ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828280 r8:8027ecf4 r7:eb101e60 r6:84828300 r5:83aa2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4c80 INFO: task kworker/1:10:3186 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2954000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3189 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:83aa6000 r4:83aa6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa6000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577eb8c r4:8577e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577eb8c r4:84828380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:848283ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828380 r8:8027ecf4 r7:eb101e60 r6:84828400 r5:83aa6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4fc0 INFO: task kworker/1:11:3189 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2bc9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3190 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3190 tgid:3190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:83aa0c00 r4:83aa0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577e78c r4:8577e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577e78c r4:84828480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa0c00 r8:848284ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828480 r8:8027ecf4 r7:dfb7de60 r6:84828500 r5:83aa0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:841a4fc0 INFO: task kworker/1:12:3190 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c2e91000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:83316000 r4:83316000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83316000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83316000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577f38c r4:8577f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577f38c r4:84828580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83316000 r8:848285ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828580 r8:8027ecf4 r7:dfb7de60 r6:84828600 r5:83316000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829080 INFO: task kworker/1:13:3193 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3276000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfba1d84 r8:00000002 r7:60000113 r6:dfba1d8c r5:849c0000 r4:849c0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577ef8c r4:8577ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577ef8c r4:84828680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0000 r8:848286ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828680 r8:8027ecf4 r7:dfb4de60 r6:84828700 r5:849c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829280 INFO: task kworker/1:14:3195 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3276000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3196 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfba5d84 r8:00000002 r7:60000013 r6:dfba5d8c r5:849c0c00 r4:849c0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebae1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577f78c r4:8577f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577f78c r4:84828780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0c00 r8:848287ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828780 r8:8027ecf4 r7:dfb4de60 r6:84828800 r5:849c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829280 INFO: task kworker/1:15:3196 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3276000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:849c2400 r4:849c2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577ff8c r4:8577fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577ff8c r4:84828880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c2400 r8:848288ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828880 r8:8027ecf4 r7:dfba5e60 r6:84828900 r5:849c2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829440 INFO: task kworker/1:16:3199 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3834000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:849c3000 r4:849c3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577fb8c r4:8577f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577fb8c r4:84828980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3000 r8:848289ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828980 r8:8027ecf4 r7:dfad9e60 r6:84828a00 r5:849c3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829840 INFO: task kworker/1:17:3201 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3834000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:849c3c00 r4:849c3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb67000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578038c r4:85780000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578038c r4:84828a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3c00 r8:84828aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828a80 r8:8027ecf4 r7:dfad9e60 r6:84828b00 r5:849c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829840 INFO: task kworker/1:18:3202 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3d17000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:849c1800 r4:849c1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb81000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578078c r4:85780400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578078c r4:84828b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c1800 r8:84828bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828b80 r8:8027ecf4 r7:dfbc9e60 r6:84828c00 r5:849c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829cc0 INFO: task kworker/1:19:3206 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c4315000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3207 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3207 tgid:3207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:832f0000 r4:832f0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc79000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85780f8c r4:85780c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85780f8c r4:84828c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0000 r8:84828cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828c80 r8:8027ecf4 r7:dfb9de60 r6:84735180 r5:832f0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84829900 INFO: task kworker/1:20:3207 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbf5d84 r8:00000002 r7:60000113 r6:dfbf5d8c r5:838b5400 r4:838b5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:838b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85780b8c r4:85780800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85780b8c r4:84828d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838b5400 r8:84828d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828d00 r8:8027ecf4 r7:dfbe9e60 r6:84735200 r5:838b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820080 INFO: task kworker/1:21:3209 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3211 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:8324a400 r4:8324a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8324a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85781b8c r4:85781800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85781b8c r4:84828d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:84828dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828d80 r8:8027ecf4 r7:dfbe9e60 r6:84735280 r5:8324a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820140 INFO: task kworker/1:22:3211 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfbe1d84 r8:00000002 r7:60000113 r6:dfbe1d8c r5:849c5400 r4:849c5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578138c r4:85781000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578138c r4:84828e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:84828e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828e00 r8:8027ecf4 r7:dfc0de60 r6:84828e80 r5:849c5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe1fb0 to 0xdfbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820140 INFO: task kworker/1:23:3212 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c49b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:849c6000 r4:849c6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec66b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578178c r4:85781400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578178c r4:84828f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6000 r8:84828f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84828f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84828f00 r8:8027ecf4 r7:dfc0de60 r6:84828f80 r5:849c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:849c6c00 r4:849c6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782b8c r4:85782800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85782b8c r4:84764000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c6c00 r8:8476402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764000 r8:8027ecf4 r7:dfc0de60 r6:84764080 r5:849c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820540 INFO: task kworker/1:25:3218 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:849c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec6b3000 r10:61c88647 r9:849c4800 r8:8476412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:27:3222 blocked for more than 451 seconds. r5:83310c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e480 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85782f8c r4:85782c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85782f8c r4:84764200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83310c00 r8:8476422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764200 r8:8027ecf4 r7:dfc1de60 r6:84764280 r5:83310c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820880 INFO: task kworker/1:27:3222 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c58fb000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:849c8000 r5:849c8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e600 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848209c0 INFO: task kworker/1:28:3223 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c5e18000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3225 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:849c9800 r4:849c9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ea00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e076f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578438c r4:85784000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578438c r4:84764400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c9800 r8:8476442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764400 r8:8027ecf4 r7:dfc41e60 r6:84764480 r5:849c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820a80 INFO: task kworker/1:29:3225 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c5e18000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Exception stack(0xe044dfb0 to 0xe044dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:849cb000 r5:849cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec811000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578378c r4:85783400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578378c r4:84764500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cb000 r8:8476452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764500 r8:8027ecf4 r7:dfc55e60 r6:84764580 r5:849cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820e80 INFO: task kworker/1:30:3227 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c5e18000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3228 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:849c8c00 r4:849c8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783b8c r4:85783800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85783b8c r4:84764680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c8c00 r8:847646ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764680 r8:8027ecf4 r7:dfc55e60 r6:84764700 r5:849c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84820a40 INFO: task kworker/1:31:3228 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6472000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3230 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc79d84 r8:00000002 r7:60000113 r6:dfc79d8c r5:849ca400 r4:849ca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfded000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783f8c r4:85783c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85783f8c r4:84764780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:847647ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764780 r8:8027ecf4 r7:dfc55e60 r6:84764800 r5:849ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc79fb0 to 0xdfc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f040 INFO: task kworker/1:32:3230 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6472000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3233 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfc35d84 r8:00000002 r7:60000113 r6:dfc35d8c r5:849cc800 r4:849cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ec00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85784b8c r4:85784800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85784b8c r4:84764880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cc800 r8:847648ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764880 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f200 INFO: task kworker/1:33:3233 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6472000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3236 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3236 tgid:3236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfca5d84 r8:00000002 r7:60000113 r6:dfca5d8c r5:84089800 r4:84089800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84089800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520eb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84089800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578478c r4:85784400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578478c r4:84764980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84089800 r8:847649ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764980 r8:8027ecf4 r7:dfc35e60 r6:84735300 r5:84089800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f3c0 INFO: task kworker/1:34:3236 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6970000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3237 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:84088000 r4:84088000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84088000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84088000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb235000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85784f8c r4:85784c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85784f8c r4:84764a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84088000 r8:84764a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764a00 r8:8027ecf4 r7:dfc35e60 r6:84735380 r5:84088000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:8408ec00 r5:8408ec00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8578538c r4:84764a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8408ec00 r8:84764aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764a80 r8:8027ecf4 r7:dfcb1e60 r6:84735400 r5:8408ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f740 INFO: task kworker/1:36:3238 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6c45000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:8408bc00 r4:8408bc00 r5:8408bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b5c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8439f880 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8324bc00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520ef40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578578c r4:85785400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578578c r4:84764b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324bc00 r8:84764bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764b80 r8:8027ecf4 r7:dfcc1e60 r6:84735500 r5:8324bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f880 INFO: task kworker/1:38:3241 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c71a9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 task:kworker/1:39 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84878c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84764c00 r8:8027ecf4 r7:dfcc1e60 r6:84735580 r5:84878c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9ddfb0 to 0xdf9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439f9c0 INFO: task kworker/1:39:3246 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c77b9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:40 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfca1d84 r8:00000002 r7:60000113 r6:dfca1d8c r5:849ce000 r4:849ce000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ce000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520efc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb757000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85785f8c r4:85785c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85785f8c r4:84764c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ce000 r8:84764cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764c80 r8:8027ecf4 r7:df9dde60 r6:84764d00 r5:849ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca1fb0 to 0xdfca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r4:849cd400 r5:849cd400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba09000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578678c r4:85786400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578678c r4:84764d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cd400 r8:84764dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84764d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84764d80 r8:8027ecf4 r7:df9dde60 r6:84764e00 r5:849cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8439fc40 INFO: task kworker/1:41:3249 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c7f78000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9c9d84 r8:00000002 r7:60000013 r6:df9c9d8c r5:849cbc00 r4:849cbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebba5000 r10:61c88647 r9:849cbc00 r8:84764eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:dfa21d84 r8:00000002 r7:60000113 r6:dfa21d8c r5:849cec00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84764f80 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3256 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:838b0c00 r4:838b0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:838b0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6780 r9:83018205 r8:838b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:838b0c00 r8:847860ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:83aa4800 r4:83aa4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aa4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578938c r4:85789000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578938c r4:84786180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa4800 r8:847861ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786180 r8:8027ecf4 r7:dfa21e60 r6:84786200 r5:83aa4800 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:849d0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8578838c r4:85788000 r10:61c88647 r9:849d0000 r8:847862ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:849d0c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788b8c r4:85788800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85788b8c r4:84786380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0c00 r8:847863ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786380 r8:8027ecf4 r7:dfa55e60 r6:84786400 r5:849d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84787180 INFO: task kworker/1:47:3262 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c9384000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:48:3263 blocked for more than 452 seconds. r4:849d1800 r5:849d1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:48:3263 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c98ce000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:dfa81d84 r8:00000002 r7:60000013 r6:dfa81d8c r5:849d2400 r5:849d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e66c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec719000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578978c r4:85789400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578978c r4:84786580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d2400 r8:847865ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84786580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84786580 r8:8027ecf4 r7:dfa55e60 r6:84786600 r5:849d2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84787680 INFO: task kworker/1:49:3266 is blocked on a mutex likely owned by task kworker/1:209:3661. dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:51:3269 blocked for more than 452 seconds. r5:849d3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c98ce000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3566 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3566 tgid:3566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84b64800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68c40 r7:dddced40 r6:83018000 r5:8498d78c r4:84808100 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:66:3597 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:66 state:D stack:0 pid:3597 tgid:3597 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:8491a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8491a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb038c r4:84bb0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb038c r4:84808a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8491a400 r8:84808a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84808a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84808a00 r8:8027ecf4 r7:e0081e60 r6:84808a80 r5:8491a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00b1fb0 to 0xe00b1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847a6d80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:3660 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0451d84 r8:00000002 r7:60000013 r6:e0451d8c r5:84b73c00 r4:84b73c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b73c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0451e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Not tainted 6.15.0-syzkaller #0 r5:84b76000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847894c0 INFO: task kworker/1:210:3664 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ca0e0000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:3667 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred r5:84b76c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: ca56b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 r4:e044ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:3668 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:3668 tgid:3668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e045dd84 r8:00000002 r7:60000113 r6:e045dd8c r5:84b75400 r4:84b75400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b75400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e045de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b75400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e004f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b75400 r8:850210ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:84b70000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84be578c r4:84be5400 r4:85021180 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789700 INFO: task kworker/1:213:3669 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cac1a000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:3672 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:84b7ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789d00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 r4:84b80000 r5:84b80000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e047b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be538c r4:84be5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be538c r4:85021380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b80000 r8:850213ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021380 r8:8027ecf4 r7:e0465e60 r6:85021400 r5:84b80000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0479fb0 to 0xe0479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789d80 INFO: task kworker/1:215:3674 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cafef000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:84b80c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:3678 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:3678 tgid:3678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e046dd84 r8:00000002 r7:60000113 r6:e046dd8c r5:84b82400 r4:84b82400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b82400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b82400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be5f8c r4:84be5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be5f8c r4:85021580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b82400 r8:850215ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021580 r8:8027ecf4 r7:e0485e60 r6:85021600 r5:84b82400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe046dfb0 to 0xe046dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502c280 INFO: task kworker/1:217:3678 is blocked on a mutex likely owned by task kworker/1:209:3661. Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 INFO: task kworker/1:218:3680 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:3680 tgid:3680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:848ebc00 r4:848ebc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ebc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ccc0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85021680 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84b83000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:84be638c r4:85021700 r4:85021700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021700 r8:8027ecf4 r7:e04ade60 r6:85021780 r5:84b83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04a1fb0 to 0xe04a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502c380 INFO: task kworker/1:219:3681 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cbd11000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:67:3684 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:67 state:D stack:0 pid:3684 tgid:3684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04d1d84 r8:00000002 r7:60000113 r6:e04d1d8c r5:84b84800 r4:84b84800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b84800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:84bb078c r4:84bb0400 r10:00000000 r9:84b6a180 r8:8027ecf4 r7:e00b1e60 r6:85021800 r5:84b84800 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:3686 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:3686 tgid:3686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:84b81800 r4:84b81800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b81800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b81800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfaf8c r4:84bfac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bfaf8c r4:84b6a200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b81800 r8:84b6a22c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a200 r8:8027ecf4 r7:e04d1e60 r6:85021880 r5:84b81800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84b68d00 INFO: task kworker/0:68:3686 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cbe12000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:3687 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04ddd84 r8:00000002 r7:60000113 r6:e04ddd8c r5:84b83c00 r4:84b83c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b83c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850366c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0f8c r4:84bb0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb0f8c r4:84b6a280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b83c00 r8:84b6a2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a280 r8:8027ecf4 r7:e04d9e60 r6:85021900 r5:84b83c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04ddfb0 to 0xe04ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84b68d00 INFO: task kworker/0:69:3687 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc263000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:3689 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:3689 tgid:3689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0491d84 r8:00000002 r7:60000113 r6:e0491d8c r5:848ed400 r4:848ed400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ed400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be678c r4:84be6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be678c r4:85021980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ed400 r8:850219ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021980 r8:8027ecf4 r7:e04ade60 r6:84b6a300 r5:848ed400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0491fb0 to 0xe0491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502cb40 INFO: task kworker/1:220:3689 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc263000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:3693 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:3693 tgid:3693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e050dd84 r8:00000002 r7:60000113 r6:e050dd8c r5:848ee000 r4:848ee000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ee000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8502cac0 INFO: task kworker/1:221:3693 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc84d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:3694 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:3694 tgid:3694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0511d84 r8:00000002 r7:60000113 r6:e0511d8c r5:848eec00 r4:848eec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848eec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c1c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf278c r4:84bf2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf278c r4:85021a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848eec00 r8:85021aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021a80 r8:8027ecf4 r7:e050de60 r6:84b6a400 r5:848eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0511fb0 to 0xe0511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502cac0 INFO: task kworker/1:222:3694 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc84d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:3695 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0519d84 r8:00000002 r7:60000013 r6:e0519d8c r5:848ec800 r4:848ec800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848ec800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0519e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502cfc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0505000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be738c r4:84be7000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be738c r4:85021b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ec800 r8:85021b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:847a6d80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:83b60c00 r5:83b60c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0531e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:84be778c r4:84be7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be778c r4:85021b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b60c00 r8:85021bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021b80 r8:8027ecf4 r7:e0511e60 r6:84b6a500 r5:83b60c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0531fb0 to 0xe0531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502cf00 INFO: task kworker/1:224:3697 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cd02b000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:83b60000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85021c00 dfa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfdd1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:83b61800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83b61800 r8:85021cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:226:3701 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cd39c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:227:3703 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:227 state:D stack:0 pid:3703 tgid:3703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0569d84 r8:00000002 r7:60000113 r6:e0569d8c r5:83b62400 r4:83b62400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b62400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0569e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf038c r4:84bf0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf038c r4:85021d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b62400 r8:85021d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021d00 r8:8027ecf4 r7:e0511e60 r6:84b6a680 r5:83b62400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0569fb0 to 0xe0569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f080 INFO: task kworker/1:227:3703 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cd80f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3705 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3705 tgid:3705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0579d84 r8:00000002 r7:60000013 r6:e0579d8c r5:83b63000 r4:83b63000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b63000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0579e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b63000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf078c r4:84bf0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf078c r4:85021d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b63000 r8:85021dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021d80 r8:8027ecf4 r7:e0511e60 r6:84b6a700 r5:83b63000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0579fb0 to 0xe0579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f140 INFO: task kworker/1:228:3705 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cdb00000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:3707 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0591d84 r8:00000002 r7:60000013 r6:e0591d8c r5:83b63c00 r4:83b63c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b63c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0587000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf0b8c r4:84bf0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf0b8c r4:85021e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b63c00 r8:85021e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85021e00 r8:8027ecf4 r7:e0511e60 r6:84b6a780 r5:83b63c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0591fb0 to 0xe0591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f240 INFO: task kworker/1:229:3707 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cdb00000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:230:3709 blocked for more than 452 seconds. r5:84b85400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85021e80 r8:8027ecf4 r7:e0511e60 r6:85021f00 r5:84b85400 r4:8502f3c0 INFO: task kworker/1:230:3709 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cde72000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3712 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:3712 tgid:3712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0595d84 r8:00000002 r7:60000113 r6:e0595d8c r5:84b86c00 r4:84b86c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b86c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0595e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf138c r4:84bf1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf138c r4:85021f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b86c00 r8:85021fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85021f80 r10:00000000 r9:85021f80 r8:8027ecf4 r7:e0511e60 r6:85040000 r5:84b86c00 r4:8502f600 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:84b86000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85040080 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502f880 INFO: task kworker/1:232:3713 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ce209000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:3716 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:3716 tgid:3716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e05ddd84 r8:00000002 r7:60000113 r6:e05ddd8c r5:84ba1800 r4:84ba1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85040180 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ba2400 r4:829189bc r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf1f8c r4:84bf1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf1f8c r4:85040280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba2400 r8:850402ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040280 r8:8027ecf4 r7:e0511e60 r6:85040300 r5:84ba2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e9fb0 to 0xe05e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502fc40 INFO: task kworker/1:234:3718 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ce2b6000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:235:3719 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:235 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e05f5d84 r8:00000002 r7:60000113 r6:e05f5d8c r5:84ba0c00 r4:84ba0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b68480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df901000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf238c r4:84bf2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf238c r4:85040380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba0c00 r8:850403ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040380 r8:8027ecf4 r7:e0511e60 r6:85040400 r5:84ba0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f5fb0 to 0xe05f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:235:3719 is blocked on a mutex likely owned by task kworker/1:209:3661. dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:236 state:D stack:0 pid:3722 tgid:3722 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ba3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85040480 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:3724 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0129d84 r8:00000002 r7:60000113 r6:e0129d8c r5:84ba3c00 r4:84ba3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0129e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf378c r4:84bf3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf378c r4:85040580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba3c00 r8:850405ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040580 r8:8027ecf4 r7:e05bde60 r6:85040600 r5:84ba3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0129fb0 to 0xe0129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042080 INFO: task kworker/1:237:3724 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cec42000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3727 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3727 tgid:3727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e05fdd84 r8:00000002 r7:60000113 r6:e05fdd8c r5:84ba4800 r4:84ba4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbcd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf2f8c r4:84bf2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf2f8c r4:85040680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba4800 r8:850406ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040680 r8:8027ecf4 r7:e0129e60 r6:85040700 r5:84ba4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042180 INFO: task kworker/1:238:3727 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cee3f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:3728 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:3728 tgid:3728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0601d84 r8:00000002 r7:60000113 r6:e0601d8c r5:84ba5400 r4:84ba5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba5400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:84bf338c r4:85040780 r4:85040780 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r5:84be3b8c r4:84be3800 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:3730 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:84ba6000 r4:84ba6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba6000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf838c r4:84bf8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf838c r4:85040880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba6000 r8:850408ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040880 r8:8027ecf4 r7:e0129e60 r6:85040900 r5:84ba6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0609fb0 to 0xe0609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042480 INFO: task kworker/1:240:3730 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cf12c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:3732 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0615d84 r8:00000002 r7:60000113 r6:e0615d8c r5:84ba6c00 r4:84ba6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf3b8c r4:84bf3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf3b8c r4:85040980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba6c00 r8:850409ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040980 r8:8027ecf4 r7:e0609e60 r6:85040a00 r5:84ba6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850426c0 INFO: task kworker/1:241:3732 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cf12c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:242:3734 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:242 state:D stack:0 pid:3734 tgid:3734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0619d84 r8:00000002 r7:60000013 r6:e0619d8c r5:84ba0000 r4:84ba0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ba0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ba0000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf3f8c r4:84bf3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf3f8c r4:85040a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ba0000 r8:85040aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040a80 r8:8027ecf4 r7:e0609e60 r6:85040b00 r5:84ba0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0619fb0 to 0xe0619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042700 INFO: task kworker/1:242:3734 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cf5eb000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:3736 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:3736 tgid:3736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e011dd84 r8:00000002 r7:60000013 r6:e011dd8c r5:847c0c00 r4:847c0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e011de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf8b8c r4:84bf8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf8b8c r4:85040b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c0c00 r8:85040bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040b80 r8:8027ecf4 r7:e0609e60 r6:85040c00 r5:847c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe011dfb0 to 0xe011dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042880 INFO: task kworker/1:243:3736 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cf8e9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:3737 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e062dd84 r8:00000002 r7:60000113 r6:e062dd8c r5:83b66c00 r4:83b66c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b66c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf878c r4:84bf8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf878c r4:85040c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b66c00 r8:85040cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040c80 r8:8027ecf4 r7:e011de60 r6:84b6a800 r5:83b66c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042880 INFO: task kworker/1:244:3737 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cfcc0000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:3740 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0621d84 r8:00000002 r7:60000013 r6:e0621d8c r5:847c1800 r4:847c1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85042ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf8f8c r4:84bf8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf8f8c r4:85040d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c1800 r8:85040d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040d00 r8:8027ecf4 r7:e011de60 r6:85040d80 r5:847c1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0621fb0 to 0xe0621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042b40 INFO: task kworker/1:245:3740 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d009f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:3743 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:3743 tgid:3743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e063dd84 r8:00000002 r7:60000013 r6:e063dd8c r5:847c2400 r4:847c2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850429c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe97000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf938c r4:84bf9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf938c r4:85040e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c2400 r8:85040e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040e00 r8:8027ecf4 r7:e0621e60 r6:85040e80 r5:847c2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85042d40 INFO: task kworker/1:246:3743 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d009f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:3744 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:3744 tgid:3744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0645d84 r8:00000002 r7:60000013 r6:e0645d8c r5:847c3000 r4:847c3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfecb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf9b8c r4:84bf9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf9b8c r4:85040f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3000 r8:85040f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85040f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85040f00 r8:8027ecf4 r7:e063de60 r6:85040f80 r5:847c3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057040 INFO: task kworker/1:247:3744 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d02cd000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:3746 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:3746 tgid:3746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0631d84 r8:00000002 r7:60000013 r6:e0631d8c r5:847c3c00 r4:847c3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf978c r4:84bf9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf978c r4:85020000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c3c00 r8:8502002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020000 r8:8027ecf4 r7:e0645e60 r6:85020080 r5:847c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057040 INFO: task kworker/1:248:3746 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d02cd000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:3748 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:3748 tgid:3748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e064dd84 r8:00000002 r7:60000113 r6:e064dd8c r5:847c5400 r4:847c5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeeb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bf9f8c r4:84bf9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bf9f8c r4:85020100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c5400 r8:8502012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020100 r8:8027ecf4 r7:e0645e60 r6:85020180 r5:847c5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057200 INFO: task kworker/1:249:3748 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d0422000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:3750 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0651d84 r8:00000002 r7:60000013 r6:e0651d8c r5:847c6c00 r4:847c6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfa38c r4:84bfa000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bfa38c r4:85020200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6c00 r8:8502022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020200 r8:8027ecf4 r7:e064de60 r6:85020280 r5:847c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057200 INFO: task kworker/1:250:3750 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d08b5000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:3752 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0649d84 r8:00000002 r7:60000013 r6:e0649d8c r5:847c4800 r4:847c4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850508c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0027000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfbf8c r4:84bfbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bfbf8c r4:85020300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c4800 r8:8502032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020300 r8:8027ecf4 r7:e0651e60 r6:85020380 r5:847c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850576c0 INFO: task kworker/1:251:3752 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d0bf3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:3754 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0659d84 r8:00000002 r7:60000013 r6:e0659d8c r5:847c0000 r4:847c0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfa78c r4:84bfa400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bfa78c r4:85020400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c0000 r8:8502042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020400 r8:8027ecf4 r7:e0649e60 r6:85020480 r5:847c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057880 INFO: task kworker/1:252:3754 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d0bf3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:3755 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85058000 r5:85058000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057d80 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058000 r8:8502052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020500 r8:8027ecf4 r7:e0649e60 r6:85020580 r5:85058000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe065dfb0 to 0xe065dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057880 INFO: task kworker/1:253:3755 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d1113000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:3759 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:3759 tgid:3759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:85059800 r4:85059800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85059800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85059800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfb38c r4:84bfb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bfb38c r4:85020600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85059800 r8:8502062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020600 r8:8027ecf4 r7:e0649e60 r6:85020680 r5:85059800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057cc0 INFO: task kworker/1:254:3759 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3761 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3761 tgid:3761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:8505b000 r4:8505b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8505b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1f8c r4:84bb1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb1f8c r4:84b6a880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505b000 r8:84b6a8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a880 r8:8027ecf4 r7:e04d9e60 r6:85020700 r5:8505b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85036300 INFO: task kworker/0:70:3761 is blocked on a mutex likely owned by task kworker/1:209:3661. Workqueue: events bpf_prog_free_deferred Exception stack(0xe044dd20 to 0xe044dd68) r4:82ac11e4 r4:e044ddc0 r4:00000000 r5:00001000 r4:dfdd1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3762 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0675d84 r8:00000002 r7:60000113 r6:e0675d8c r5:85058c00 r4:85058c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85058c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0675e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85058c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff97000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfb78c r4:84bfb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bfb78c r4:84b6a900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85058c00 r8:84b6a92c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a900 r8:8027ecf4 r7:e0671e60 r6:85020780 r5:85058c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0675fb0 to 0xe0675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85036300 INFO: task kworker/0:71:3762 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d14c3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:3764 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:3764 tgid:3764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0679d84 r8:00000002 r7:60000113 r6:e0679d8c r5:8505a400 r4:8505a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850507c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bfbb8c r4:84bfb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bfbb8c r4:85020800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505a400 r8:8502082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020800 r8:8027ecf4 r7:e0649e60 r6:85020880 r5:8505a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85050340 INFO: task kworker/1:255:3764 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d17d4000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:3765 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0681d84 r8:00000002 r7:60000113 r6:e0681d8c r5:8505d400 r4:8505d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0681e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502abc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8505d400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb178c r4:84bb1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb178c r4:84b6a980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505d400 r8:84b6a9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b6a980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b6a980 r8:8027ecf4 r7:e0671e60 r6:85020900 r5:8505d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0681fb0 to 0xe0681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85036300 INFO: task kworker/0:72:3765 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d1b20000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:3769 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:3769 tgid:3769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0685d84 r8:00000002 r7:60000013 r6:e0685d8c r5:83b64800 r4:83b64800 r5:83b64800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850509c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b64800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500838c r4:85008000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500838c r4:85020980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b64800 r8:850209ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020980 r8:8027ecf4 r7:e0649e60 r6:84b6aa00 r5:83b64800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850506c0 INFO: task kworker/1:256:3769 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d1c55000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:3771 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:3771 tgid:3771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:848eb000 r4:848eb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848eb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85009f8c r4:85009c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85009f8c r4:85020a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848eb000 r8:85020a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020a00 r8:8027ecf4 r7:e0685e60 r6:84b6aa80 r5:848eb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850506c0 INFO: task kworker/1:257:3771 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d20a7000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:3772 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:3772 tgid:3772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:84908000 r4:84908000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84908000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84908000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500878c r4:85008400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500878c r4:85020a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908000 r8:85020aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020a80 r8:8027ecf4 r7:e068de60 r6:84b6ab00 r5:84908000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850506c0 INFO: task kworker/1:258:3772 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d20a7000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:3774 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:3774 tgid:3774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:84909800 r4:84909800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84909800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84909800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85008b8c r4:85008800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85008b8c r4:85020b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84909800 r8:85020b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020b00 r8:8027ecf4 r7:e068de60 r6:84b6ab80 r5:84909800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85050b80 INFO: task kworker/1:259:3774 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d22a3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:3777 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:84908c00 r4:84908c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84908c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84908c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85008f8c r4:85008c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85008f8c r4:85020b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84908c00 r8:85020bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020b80 r8:8027ecf4 r7:e068de60 r6:84b6ac00 r5:84908c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85050a40 INFO: task kworker/1:260:3777 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d26a3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:3778 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:8505bc00 r4:8505bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0625000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500938c r4:85009000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500938c r4:85020c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505bc00 r8:85020c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020c00 r8:8027ecf4 r7:e068de60 r6:85020c80 r5:8505bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85050a40 INFO: task kworker/1:261:3778 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2825000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:262:3781 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:262 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06a1d84 r8:00000002 r7:60000013 r6:e06a1d8c r5:8505e000 r4:8505e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8505e000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8505e000 r8:85020d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:3783 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06b1d84 r8:00000002 r7:60000113 r6:e06b1d8c r5:8505ec00 r4:8505ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502ff80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85009b8c r4:85009800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85009b8c r4:85020e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505ec00 r8:85020e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020e00 r8:8027ecf4 r7:e068de60 r6:85020e80 r5:8505ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b1fb0 to 0xe06b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85057540 INFO: task kworker/1:263:3783 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2a4e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:3784 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0655d84 r8:00000002 r7:60000113 r6:e0655d8c r5:8505c800 r4:8505c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8505c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8505c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500ab8c r4:8500a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500ab8c r4:85020f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8505c800 r8:85020f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85020f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85020f00 r8:8027ecf4 r7:e068de60 r6:85020f80 r5:8505c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0655fb0 to 0xe0655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85036cc0 INFO: task kworker/1:264:3784 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:3787 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06cdd84 r8:00000002 r7:60000113 r6:e06cdd8c r5:847c6000 r4:847c6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:847c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500a38c r4:8500a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500a38c r4:83bea000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847c6000 r8:83bea02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea000 r8:8027ecf4 r7:e0655e60 r6:83bea080 r5:847c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847841c0 INFO: task kworker/1:265:3787 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2d81000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:3789 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06e5d84 r8:00000002 r7:60000113 r6:e06e5d8c r5:84b88000 r4:84b88000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b88000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500a78c r4:8500a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500a78c r4:83bea100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88000 r8:83bea12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea100 r8:8027ecf4 r7:e0655e60 r6:83bea180 r5:84b88000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847841c0 INFO: task kworker/1:266:3789 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2d81000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:3790 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:84b88c00 r4:84b88c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b88c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b88c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0705000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500b38c r4:8500b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500b38c r4:83bea200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88c00 r8:83bea22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea200 r8:8027ecf4 r7:e0655e60 r6:83bea280 r5:84b88c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847843c0 INFO: task kworker/1:267:3790 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d30a9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:3793 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06fdd84 r8:00000002 r7:60000113 r6:e06fdd8c r5:84b89800 r4:84b89800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b89800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500af8c r4:8500ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500af8c r4:83bea300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b89800 r8:83bea32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea300 r8:8027ecf4 r7:e06f1e60 r6:83bea380 r5:84b89800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06fdfb0 to 0xe06fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847844c0 INFO: task kworker/1:268:3793 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d30a9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:3795 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:3795 tgid:3795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0709d84 r8:00000002 r7:60000013 r6:e0709d8c r5:84b8a400 r4:84b8a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500b78c r4:8500b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500b78c r4:83bea400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8a400 r8:83bea42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0709fb0 to 0xe0709ff8) INFO: task kworker/1:269:3795 is blocked on a mutex likely owned by task kworker/1:209:3661. [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:3797 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0715d84 r8:00000002 r7:60000013 r6:e0715d8c r5:84b8b000 r4:84b8b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0735000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501438c r4:85014000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501438c r4:83bea500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8b000 r8:83bea52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea500 r8:8027ecf4 r7:e0709e60 r6:83bea580 r5:84b8b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84784700 INFO: task kworker/1:270:3797 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d3561000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:271:3799 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:271 state:D stack:0 pid:3799 tgid:3799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:84b8bc00 r4:84b8bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500bb8c r4:8500b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500bb8c r4:83bea600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8bc00 r8:83bea62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea600 r8:8027ecf4 r7:e0715e60 r6:83bea680 r5:84b8bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847848c0 INFO: task kworker/1:271:3799 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r5:84be3b8c r4:84be3800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:3801 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:3801 tgid:3801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e072dd84 r8:00000002 r7:60000013 r6:e072dd8c r5:84b8c800 r4:84b8c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e072de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84784bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0729000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8500bf8c r4:8500bc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8500bf8c r4:83bea700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8c800 r8:83bea72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea700 r8:8027ecf4 r7:e0715e60 r6:83bea780 r5:84b8c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe072dfb0 to 0xe072dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847849c0 INFO: task kworker/1:272:3801 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84b8d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850361c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85014b8c r4:85014800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85014b8c r4:83bea800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8d400 r8:83bea82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bea800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bea800 r8:8027ecf4 r7:e0715e60 r6:83bea880 r5:84b8d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84784b40 INFO: task kworker/1:273:3803 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d3cd2000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:3804 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84b8e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:83bea900 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84784b40 INFO: task kworker/1:274:3804 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d3cd2000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:3807 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84b8ec00 r4:84b8ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0759000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85014f8c r4:85014c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85014f8c r4:83beaa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8ec00 r8:83beaa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83beaa00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83beaa00 r8:8027ecf4 r7:e0745e60 r6:83beaa80 r5:84b8ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4080 INFO: task kworker/1:275:3807 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d3fbd000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:3809 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e075dd84 r8:00000002 r7:60000113 r6:e075dd8c r5:84b90000 r4:84b90000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b90000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0765000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501538c r4:85015000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501538c r4:83beab00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b90000 r8:83beab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83beab00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83beab00 r8:8027ecf4 r7:e0751e60 r6:83beab80 r5:84b90000 Exception stack(0xe075dfb0 to 0xe075dff8) r4:847b4080 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:e044ddc0 r4:00000000 r5:00001000 r4:dfdd1000 r5:84be3b8c r4:84be3800 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:3813 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:3813 tgid:3813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0769d84 r8:00000002 r7:60000013 r6:e0769d8c r5:84b90c00 r4:84b90c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b90c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b44c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0775000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501578c r4:85015400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501578c r4:83beac00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b90c00 r8:83beac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83beac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83beac00 r8:8027ecf4 r7:e075de60 r6:83beac80 r5:84b90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0769fb0 to 0xe0769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4340 INFO: task kworker/1:277:3813 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d44c2000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:3814 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:278 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b91800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0785000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85015b8c r4:85015800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85015b8c r4:83bead00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b91800 r8:83bead2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bead00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bead00 r8:8027ecf4 r7:e0769e60 r6:83bead80 r5:84b91800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0789fb0 to 0xe0789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4480 INFO: task kworker/1:278:3814 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d44c2000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:3815 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:3815 tgid:3815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0799d84 r8:00000002 r7:60000113 r6:e0799d8c r5:84b92400 r4:84b92400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b92400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0799e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b92400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85015f8c r4:85015c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85015f8c r4:83beae00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b92400 r8:83beae2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83beae00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83beae00 r8:8027ecf4 r7:e0789e60 r6:83beae80 r5:84b92400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0799fb0 to 0xe0799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b46c0 INFO: task kworker/1:279:3815 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d481a000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:3818 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0475d84 r8:00000002 r7:60000113 r6:e0475d8c r5:84b93000 r4:84b93000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b93000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0475e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b93000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501638c r4:85016000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501638c r4:83beaf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93000 r8:83beaf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83beaf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83beaf00 r8:8027ecf4 r7:e0799e60 r6:83beaf80 r5:84b93000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0475fb0 to 0xe0475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4580 INFO: task kworker/1:280:3818 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d481a000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:3819 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:3819 tgid:3819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e077dd84 r8:00000002 r7:60000113 r6:e077dd8c r5:84b93c00 r4:84b93c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b93c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa51000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85016b8c r4:85016800 r7:ddde2d40 r6:83018200 r5:85016b8c r4:8478d000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r5:84be3b8c r4:84be3800 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:84789140 task:kworker/1:282 state:D stack:0 pid:3820 tgid:3820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e048dd84 r8:00000002 r7:60000113 r6:e048dd8c r5:84b94800 r4:84b94800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b94800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b94800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501678c r4:85016400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501678c r4:8478d100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b94800 r8:8478d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d100 r8:8027ecf4 r7:e077de60 r6:8478d180 r5:84b94800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe048dfb0 to 0xe048dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4580 INFO: task kworker/1:282:3820 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d4fda000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 Exception stack(0xe044dfb0 to 0xe044dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:283 state:D stack:0 pid:3823 tgid:3823 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8490bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85017b8c r4:85017800 r7:ddde2d40 r6:83018200 r5:85017b8c r4:8478d200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490bc00 r8:8478d22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d200 r8:8027ecf4 r7:e077de60 r6:84b6ac80 r5:8490bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04fdfb0 to 0xe04fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4bc0 INFO: task kworker/1:283:3823 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d5368000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:3824 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0521d84 r8:00000002 r7:60000013 r6:e0521d8c r5:8490a400 r4:8490a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8490a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85016f8c r4:85016c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85016f8c r4:8478d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490a400 r8:8478d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d280 r8:8027ecf4 r7:e04fde60 r6:84b6ad00 r5:8490a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0521fb0 to 0xe0521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4d80 INFO: task kworker/1:284:3824 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d5368000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:285:3826 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:285 state:D stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0481d84 r8:00000002 r7:60000013 r6:e0481d8c r5:84b95400 r4:84b95400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b95400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b4fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b95400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501738c r4:85017000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501738c r4:8478d300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b95400 r8:8478d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d300 r8:8027ecf4 r7:e04fde60 r6:8478d380 r5:84b95400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0481fb0 to 0xe0481ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b4c40 INFO: task kworker/1:285:3826 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d5958000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:3828 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84b96000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfcdd000 r5:8501778c r4:85017400 r7:ddde2d40 r6:83018200 r5:8501778c r4:8478d400 r4:8478d400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d400 r8:8027ecf4 r7:e04fde60 r6:8478d480 r5:84b96000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0539fb0 to 0xe0539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a880 INFO: task kworker/1:286:3828 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d5bee000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:3832 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e04c5d84 r8:00000002 r7:60000013 r6:e04c5d8c r5:84b98000 r4:84b98000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b98000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ca280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85017f8c r4:85017c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85017f8c r4:8478d500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b98000 r8:8478d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d500 r8:8027ecf4 r7:e04fde60 r6:8478d580 r5:84b98000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:3833 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:3833 tgid:3833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0541d84 r8:00000002 r7:60000113 r6:e0541d8c r5:84b98c00 r4:84b98c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b98c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0541e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ca4c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508438c r4:85084000 r10:61c88647 r9:84b98c00 r8:8478d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ca100 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0571d84 r8:00000002 r7:60000113 r6:e0571d8c r5:84b9a400 r4:84b9a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b9a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0571e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ca880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084b8c r4:85084800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85084b8c r4:8478d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9a400 r8:8478d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d700 r8:8027ecf4 r7:e0541e60 r6:8478d780 r5:84b9a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0571fb0 to 0xe0571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847ca340 INFO: task kworker/1:289:3835 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d6431000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84b99800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0561e08 r9:83018205 r8:84b99800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r4:8478d800 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:3839 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0581d84 r8:00000002 r7:60000113 r6:e0581d8c r5:84b9bc00 r4:84b9bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b9bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847caa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0059000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85084f8c r4:85084c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85084f8c r4:8478d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9bc00 r8:8478d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478d900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478d900 r8:8027ecf4 r7:e0571e60 r6:8478d980 r5:84b9bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d6797000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 r5:00001000 r4:dfdd1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84b9c800 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:3843 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0585d84 r8:00000002 r7:60000113 r6:e0585d8c r5:84b9d400 r4:84b9d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b9d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cad40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:8508578c r4:85085400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:3846 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:294 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b9e000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cae80 r7:ddde2d40 r6:83018200 r5:85085b8c r4:8478dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478dc00 r8:8027ecf4 r7:e0585e60 r6:8478dc80 r5:84b9e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe058dfb0 to 0xe058dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847cabc0 INFO: task kworker/1:294:3846 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d6f6d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8490e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85085f8c r4:8478dd00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d6f6d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:8490b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8490b000 r8:8478ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8490ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8490ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086b8c r4:85086800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85086b8c r4:8478de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490ec00 r8:8478de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478de00 r8:8027ecf4 r7:e07a9e60 r6:84b6ae80 r5:8490ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07adfb0 to 0xe07adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479eec0 INFO: task kworker/1:297:3851 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d75e0000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:3853 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07b1d84 r8:00000002 r7:60000113 r6:e07b1d8c r5:8490d400 r4:8490d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8490d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8490d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ed000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8508678c r4:85086400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8508678c r4:8478de80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8490d400 r8:8478deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478de80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478de80 r8:8027ecf4 r7:e07ade60 r6:84b6af00 r5:8490d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501d080 INFO: task kworker/1:298:3853 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d78ed000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:83b66000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83b66000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:8508738c r4:85087000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8508738c r4:8478df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b66000 r8:8478df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478df00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478df00 r8:8027ecf4 r7:e07ade60 r6:84b6af80 r5:83b66000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c1fb0 to 0xe07c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501d1c0 INFO: task kworker/1:299:3855 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d7b8d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:3856 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:3856 tgid:3856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07c5d84 r8:00000002 r7:60000113 r6:e07c5d8c r5:83b65400 r4:83b65400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b65400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b65400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0507000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85086f8c r4:85086c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85086f8c r4:8478df80 r10:00000000 r9:8478df80 r8:8027ecf4 r7:e07c1e60 r6:847a3000 r5:83b65400 Exception stack(0xe07c5fb0 to 0xe07c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501d1c0 INFO: task kworker/1:300:3856 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d7d67000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84789140 task:kworker/1:301 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8490c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501db40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85026000 r8:8027ecf4 r7:e07c1e60 r6:85026080 r5:8490c800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e044ddc0 r4:00000000 r5:00001000 r4:dfdd1000 r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:302 state:D stack:0 pid:3862 tgid:3862 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84b9b000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d440 r7:ddde2d40 r6:83018200 r5:8508778c r4:85026100 r4:00000001 r4:8501d440 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:3863 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07d1d84 r8:00000002 r7:60000113 r6:e07d1d8c r5:84b9ec00 r4:84b9ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b9ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84b9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0879000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb1b8c r4:847a3080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b9ec00 r8:847a30ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3080 r8:8027ecf4 r7:e0671e60 r6:85026200 r5:84b9ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502aa40 INFO: task kworker/0:73:3863 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d82e5000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:84be3b8c r4:84be3800 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r5:85060000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85087f8c r4:85087c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r4:00000000 r5:84be3b8c r4:84be3800 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:3868 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:85060c00 r4:85060c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85060c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85060c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509038c r4:85090000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509038c r4:85026380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85060c00 r8:850263ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026380 r8:8027ecf4 r7:e07c9e60 r6:85026400 r5:85060c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501da40 INFO: task kworker/1:304:3868 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:82ac11e4 r4:00000000 r5:00001000 r4:dfdd1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85061800 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8501dc40 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:dfdd1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:3872 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:3872 tgid:3872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07d9d84 r8:00000002 r7:60000013 r6:e07d9d8c r5:85062400 r4:85062400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85062400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501d040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85062400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85090b8c r4:85090800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85090b8c r4:85026580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85062400 r8:850265ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026580 r8:8027ecf4 r7:e07d5e60 r6:85026600 r5:85062400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d9fb0 to 0xe07d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501da40 INFO: task kworker/1:306:3872 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d8b3e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:3874 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07edd84 r8:00000002 r7:60000013 r6:e07edd8c r5:85063000 r4:85063000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85063000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d30c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85063000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85090f8c r4:85090c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85090f8c r4:85026700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85063000 r8:8502672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026700 r8:8027ecf4 r7:e07d9e60 r6:85026780 r5:85063000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d3000 INFO: task kworker/1:307:3874 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d8e75000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:3876 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07f9d84 r8:00000002 r7:60000013 r6:e07f9d8c r5:85063c00 r4:85063c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85063c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85063c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509178c r4:85091400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509178c r4:85026680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85063c00 r8:850266ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026680 r8:8027ecf4 r7:e07ede60 r6:85026800 r5:85063c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f9fb0 to 0xe07f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d3240 INFO: task kworker/1:308:3876 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d92b3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:3878 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0805d84 r8:00000002 r7:60000113 r6:e0805d8c r5:85064800 r5:85064800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85064800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0801000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509138c r4:85091000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509138c r4:85026880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85064800 r8:850268ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026880 r8:8027ecf4 r7:e07f9e60 r6:85026900 r5:85064800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0805fb0 to 0xe0805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d3240 INFO: task kworker/1:309:3878 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d9689000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85065400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d36c0 r10:61c88647 r9:85065400 r8:850269ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d35c0 Call trace: dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:3882 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:85066000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r5:85066c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85026b80 r8:8027ecf4 r7:e082de60 r6:85026c00 r5:85066c00 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d9da3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:3887 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:850c0000 r5:850c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e084de08 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:850c0c00 r4:829189bc r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48c3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509338c r4:85093000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509338c r4:85026d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c0c00 r8:85026dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026d80 r8:8027ecf4 r7:e084de60 r6:85026e00 r5:850c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0859fb0 to 0xe0859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d3a00 INFO: task kworker/1:314:3888 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: da021000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:850c1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85092b8c r4:85092800 r10:61c88647 r9:850c1800 r8:85026eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe079dfb0 to 0xe079dff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84789140 task:kworker/1:316 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850c2400 r4:829189bc r4:00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e086d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85092f8c r4:85092c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85092f8c r4:85026f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c2400 r8:85026fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85026f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85026f80 r8:8027ecf4 r7:e0859e60 r6:8503e000 r5:850c2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0865fb0 to 0xe0865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d3d40 INFO: task kworker/1:316:3891 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: da4ee000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:3893 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:3893 tgid:3893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:850c3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509378c r4:85093400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509378c r4:8503e080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c3000 r8:8503e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e080 r8:8027ecf4 r7:e0859e60 r6:8503e100 r5:850c3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3895 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3895 tgid:3895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48bdd84 r8:00000002 r7:60000113 r6:e48bdd8c r5:850c5400 r4:850c5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48bde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850726c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2f8c r4:84bb2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb2f8c r4:847a3100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c5400 r8:847a312c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3100 r8:8027ecf4 r7:e0671e60 r6:8503e180 r5:850c5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48bdfb0 to 0xe48bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:74:3895 is blocked on a mutex likely owned by task kworker/1:209:3661. dd60: 80070013 ffffffff r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:850c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:84bb278c r4:84bb2400 r10:61c88647 r9:850c3c00 r8:847a31ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85072100 INFO: task kworker/0:75:3897 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dabea000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 r5:84be3b8c r4:84be3800 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84a20c00 r5:84a20c00 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84a20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85093b8c r4:85093800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85093b8c r4:8503e280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20c00 r8:8503e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e280 r8:8027ecf4 r7:e0871e60 r6:847a3200 r5:84a20c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48ddfb0 to 0xe48ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a100 INFO: task kworker/1:318:3900 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dabea000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r4:84789140 INFO: task kworker/1:319:3902 blocked for more than 455 seconds. [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84a23000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84a23000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df93d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509cb8c r4:8509c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509cb8c r4:8503e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23000 r8:8503e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e300 r8:8027ecf4 r7:e48dde60 r6:847a3280 r5:84a23000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48e5fb0 to 0xe48e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a100 INFO: task kworker/1:319:3902 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dafb9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:3903 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48f1d84 r8:00000002 r7:60000013 r6:e48f1d8c r5:84a20000 r4:84a20000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a20000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a20000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85093f8c r4:85093c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85093f8c r4:8503e380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20000 r8:8503e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e380 r8:8027ecf4 r7:e48e5e60 r6:847a3300 r5:84a20000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48f1fb0 to 0xe48f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a100 INFO: task kworker/1:320:3903 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: db30c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:3905 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:3905 tgid:3905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8905d84 r8:00000002 r7:60000013 r6:e8905d8c r5:84a22400 r4:84a22400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a22400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8905e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a22400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509c38c r4:8509c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509c38c r4:8503e400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a22400 r8:8503e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e400 r8:8027ecf4 r7:e48e5e60 r6:847a3380 r5:84a22400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8905fb0 to 0xe8905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a340 INFO: task kworker/1:321:3905 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: db30c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:3907 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:3907 tgid:3907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8911d84 r8:00000002 r7:60000113 r6:e8911d8c r5:84a24800 r4:84a24800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a24800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8911e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506a800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a24800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8901000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509c78c r4:8509c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509c78c r4:8503e480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:8503e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e480 r8:8027ecf4 r7:e48e5e60 r6:847a3400 r5:84a24800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8911fb0 to 0xe8911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a740 INFO: task kworker/1:322:3907 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: db662000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:3912 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84a26000 r4:84a26000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a26000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e069de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830cb140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509eb8c r4:8509e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509eb8c r4:8503e500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a26000 r8:8503e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e500 r8:8027ecf4 r7:e48e5e60 r6:847a3480 r5:84a26000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe069dfb0 to 0xe069dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a7c0 INFO: task kworker/1:323:3912 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: db662000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:3914 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e06c1d84 r8:00000002 r7:60000113 r6:e06c1d8c r5:84a23c00 r4:84a23c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a23c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506aac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509cf8c r4:8509cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509cf8c r4:8503e580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23c00 r8:8503e5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e580 r8:8027ecf4 r7:e069de60 r6:847a3500 r5:84a23c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c1fb0 to 0xe06c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a7c0 INFO: task kworker/1:324:3914 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dbb3c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3915 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3915 tgid:3915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0739d84 r8:00000002 r7:60000013 r6:e0739d8c r5:84a21800 r4:84a21800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a21800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85072d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a21800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2b8c r4:84bb2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb2b8c r4:847a3580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a21800 r8:847a35ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3580 r8:8027ecf4 r7:e48bde60 r6:847a3600 r5:84a21800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85072b80 INFO: task kworker/0:76:3915 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dbb3c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3916 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e891dd84 r8:00000002 r7:60000113 r6:e891dd8c r5:84a25400 r4:84a25400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a25400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e891de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a25400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb378c r4:84bb3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb378c r4:847a3680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a25400 r8:847a36ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3680 r8:8027ecf4 r7:e48bde60 r6:847a3700 r5:84a25400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe891dfb0 to 0xe891dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85072640 INFO: task kworker/0:77:3916 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dbdc3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3918 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e0661d84 r8:00000002 r7:60000013 r6:e0661d8c r5:84a26c00 r4:84a26c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a26c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474a700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb338c r4:84bb3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb338c r4:847a3780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a26c00 r8:847a37ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3780 r8:8027ecf4 r7:e891de60 r6:847a3800 r5:84a26c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474a980 INFO: task kworker/0:78:3918 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dc210000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:3921 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8929d84 r8:00000002 r7:60000113 r6:e8929d8c r5:84911800 r4:84911800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84911800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8929e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ac80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84911800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509d38c r4:8509d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509d38c r4:8503e600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84911800 r8:8503e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e600 r8:8027ecf4 r7:e069de60 r6:847a3880 r5:84911800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8929fb0 to 0xe8929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506a8c0 INFO: task kworker/1:325:3921 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dc210000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3922 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3922 tgid:3922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e892dd84 r8:00000002 r7:60000013 r6:e892dd8c r5:84910000 r4:84910000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84910000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e892de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84910000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe8b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3f8c r4:84bb3c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb3f8c r4:847a3900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84910000 r8:847a392c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3900 r8:8027ecf4 r7:e891de60 r6:847a3980 r5:84910000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe892dfb0 to 0xe892dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507b080 INFO: task kworker/0:79:3922 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dc2d5000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3924 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48b9d84 r8:00000002 r7:60000013 r6:e48b9d8c r5:84913000 r4:84913000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84913000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84913000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3b8c r4:84bb3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bb3b8c r4:847a3a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84913000 r8:847a3a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3a00 r8:8027ecf4 r7:e892de60 r6:847a3a80 r5:84913000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48b9fb0 to 0xe48b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507b200 INFO: task kworker/0:80:3924 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dc998000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:326:3926 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:326 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8935d84 r8:00000002 r7:60000113 r6:e8935d8c r5:84914800 r4:84914800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84914800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8935e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506adc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84914800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509d78c r4:8509d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509d78c r4:8503e680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84914800 r8:8503e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e680 r8:8027ecf4 r7:e069de60 r6:847a3b00 r5:84914800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8935fb0 to 0xe8935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506ab00 INFO: task kworker/1:326:3926 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dccd9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3928 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3928 tgid:3928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8939d84 r8:00000002 r7:60000013 r6:e8939d8c r5:84915400 r4:84915400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84915400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8939e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507bc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84915400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8498e38c r4:8498e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8498e38c r4:847a3b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84915400 r8:847a3bac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3b80 r8:8027ecf4 r7:e892de60 r6:847a3c00 r5:84915400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8939fb0 to 0xe8939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507b580 INFO: task kworker/0:81:3928 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dccd9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:3931 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8941d84 r8:00000002 r7:60000113 r6:e8941d8c r5:84916000 r4:84916000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84916000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8941e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506aec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84916000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509db8c r4:8509d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509db8c r4:8503e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84916000 r8:8503e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e700 r8:8027ecf4 r7:e069de60 r6:847a3c80 r5:84916000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8941fb0 to 0xe8941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506ac40 INFO: task kworker/1:327:3931 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd2f3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:3933 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8949d84 r8:00000002 r7:60000113 r6:e8949d8c r5:84912400 r4:84912400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84912400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8949e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84912400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509df8c r4:8509dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509df8c r4:8503e780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84912400 r8:8503e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e780 r8:8027ecf4 r7:e069de60 r6:847a3d00 r5:84912400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8949fb0 to 0xe8949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506ad80 INFO: task kworker/1:328:3933 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd2f3000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:3935 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e894dd84 r8:00000002 r7:60000113 r6:e894dd8c r5:84916c00 r4:84916c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84916c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e894de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507be00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84916c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8498df8c r4:8498dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8498df8c r4:847a3d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84916c00 r8:847a3dac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3d80 r8:8027ecf4 r7:e8939e60 r6:8503e800 r5:84916c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe894dfb0 to 0xe894dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507b940 INFO: task kworker/0:82:3935 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd646000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:3937 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e087dd84 r8:00000002 r7:60000013 r6:e087dd8c r5:850c6c00 r4:850c6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e087de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507bec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff37000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8498db8c r4:8498d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8498db8c r4:847a3e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c6c00 r8:847a3e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3e00 r8:8027ecf4 r7:e894de60 r6:8503e880 r5:850c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe087dfb0 to 0xe087dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507bc80 INFO: task kworker/0:83:3937 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd72d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3939 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3939 tgid:3939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8955d84 r8:00000002 r7:60000113 r6:e8955d8c r5:850c8000 r4:850c8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8955e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff73000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcc38c r4:84bcc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcc38c r4:847a3e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8000 r8:847a3eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3e80 r8:8027ecf4 r7:e087de60 r6:8503e900 r5:850c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8955fb0 to 0xe8955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507bd80 INFO: task kworker/0:84:3939 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ddc2c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:3942 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e895dd84 r8:00000002 r7:60000113 r6:e895dd8c r5:850ca400 r4:850ca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e895de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0639000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcdf8c r4:84bcdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bcdf8c r4:8503e980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ca400 r8:8503e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503e980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503e980 r8:8027ecf4 r7:e069de60 r6:8503ea00 r5:850ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe895dfb0 to 0xe895dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507e200 INFO: task kworker/1:329:3942 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dddd5000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:3943 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:3943 tgid:3943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e896dd84 r8:00000002 r7:60000013 r6:e896dd8c r5:850c8c00 r4:850c8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e896de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502af40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bccb8c r4:84bcc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bccb8c r4:847a3f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c8c00 r8:847a3f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3f00 r8:8027ecf4 r7:e8955e60 r6:8503ea80 r5:850c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe896dfb0 to 0xe896dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507be80 INFO: task kworker/0:85:3943 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ddf8d000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3944 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8971d84 r8:00000002 r7:60000113 r6:e8971d8c r5:850cb000 r4:850cb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8971e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507b3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcc78c r4:84bcc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcc78c r4:847a3f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cb000 r8:847a3fac r7:82804d40 r6:dddced40 r5:dddced60 r4:847a3f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a3f80 r8:8027ecf4 r7:e896de60 r6:8503eb00 r5:850cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8971fb0 to 0xe8971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507be80 INFO: task kworker/0:86:3944 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de18f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3946 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea985d84 r8:00000002 r7:60000013 r6:ea985d8c r5:850c9800 r4:850c9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850787c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bce38c r4:84bce000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bce38c r4:85075000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c9800 r8:8507502c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075000 r8:8027ecf4 r7:e896de60 r6:8503eb80 r5:850c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea985fb0 to 0xea985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502ad00 INFO: task kworker/0:87:3946 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de18f000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:3948 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea98dd84 r8:00000002 r7:60000013 r6:ea98dd8c r5:850cbc00 r4:850cbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0029000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bccf8c r4:84bccc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bccf8c r4:85075080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cbc00 r8:850750ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85075080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075080 r8:8027ecf4 r7:ea985e60 r6:8503ec00 r5:850cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8502ad00 INFO: task kworker/0:88:3948 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de69e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3950 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3950 tgid:3950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:850ce000 r4:850ce000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ce000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcd38c r4:84bcd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcd38c r4:85075100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ce000 r8:8507512c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075100 r8:8027ecf4 r7:ea985e60 r6:8503ec80 r5:850ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078080 INFO: task kworker/0:89:3950 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de69e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:3952 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea99dd84 r8:00000002 r7:60000113 r6:ea99dd8c r5:850cec00 r4:850cec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcd78c r4:84bcd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcd78c r4:85075180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cec00 r8:850751ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85075180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075180 r8:8027ecf4 r7:ea985e60 r6:8503ed00 r5:850cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078080 INFO: task kworker/0:90:3952 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de69e000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3954 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:850cc800 r4:850cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e060b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcdb8c r4:84bcd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcdb8c r4:85075200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cc800 r8:8507522c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075200 r8:8027ecf4 r7:ea985e60 r6:8503ed80 r5:850cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850783c0 INFO: task kworker/0:91:3954 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: deac0000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3956 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3956 tgid:3956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9add84 r8:00000002 r7:60000013 r6:ea9add8c r5:850c6000 r4:850c6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcef8c r4:84bcec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcef8c r4:85075280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c6000 r8:850752ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85075280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075280 r8:8027ecf4 r7:ea985e60 r6:8503ee00 r5:850c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9adfb0 to 0xea9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078480 INFO: task kworker/0:92:3956 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: deac0000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:3958 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9b1d84 r8:00000002 r7:60000013 r6:ea9b1d8c r5:850c4800 r4:850c4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507e140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa09000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509e78c r4:8509e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509e78c r4:8503ee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850c4800 r8:8503eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503ee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503ee80 r8:8027ecf4 r7:e069de60 r6:8503ef00 r5:850c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507ec80 INFO: task kworker/1:330:3958 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: df35c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:3960 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:850d0c00 r4:850d0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850785c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0695000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bce78c r4:84bce400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bce78c r4:85075300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d0c00 r8:8507532c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075300 r8:8027ecf4 r7:ea9ade60 r6:8503ef80 r5:850d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b9fb0 to 0xea9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078840 INFO: task kworker/0:93:3960 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: df35c000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:94:3962 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:94 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9c1d84 r8:00000002 r7:60000013 r6:ea9c1d8c r5:850d0000 r4:850d0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bceb8c r4:84bce800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bceb8c r4:85075380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d0000 r8:850753ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85075380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075380 r8:8027ecf4 r7:ea9ade60 r6:847a2000 r5:850d0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078780 INFO: task kworker/0:94:3962 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: df5ac000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:3964 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9c9d84 r8:00000002 r7:60000013 r6:ea9c9d8c r5:850d1800 r4:850d1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcf38c r4:84bcf000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcf38c r4:85075400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d1800 r8:8507542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075400 r8:8027ecf4 r7:ea9ade60 r6:847a2080 r5:850d1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850788c0 INFO: task kworker/0:95:3964 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: df638000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:3966 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:850d2400 r4:850d2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df97d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcf78c r4:84bcf400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcf78c r4:85075480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d2400 r8:850754ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85075480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075480 r8:8027ecf4 r7:ea9c9e60 r6:847a2100 r5:850d2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078a00 INFO: task kworker/0:96:3966 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: df8c6000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:3972 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:3972 tgid:3972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:850d3c00 r4:850d3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509fb8c r4:8509f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509fb8c r4:847a2180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d3c00 r8:847a21ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2180 r8:8027ecf4 r7:e069de60 r6:847a2200 r5:850d3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507ef40 INFO: task kworker/1:331:3972 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dfce9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:3973 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8945d84 r8:00000002 r7:60000013 r6:e8945d8c r5:850d4800 r4:850d4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8945e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473d000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509ef8c r4:8509ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509ef8c r4:847a2280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d4800 r8:847a22ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2280 r8:8027ecf4 r7:ea9cde60 r6:847a2300 r5:850d4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8945fb0 to 0xe8945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507ef40 INFO: task kworker/1:332:3973 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dfce9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:333:3976 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:333 state:D stack:0 pid:3976 tgid:3976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e078dd84 r8:00000002 r7:60000013 r6:e078dd8c r5:850d5400 r4:850d5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e078de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509f38c r4:8509f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509f38c r4:847a2380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d5400 r8:847a23ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2380 r8:8027ecf4 r7:ea9cde60 r6:847a2400 r5:850d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe078dfb0 to 0xe078dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027080 INFO: task kworker/1:333:3976 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dfce9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:3978 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:3978 tgid:3978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48add84 r8:00000002 r7:60000013 r6:e48add8c r5:850d6000 r4:850d6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509f78c r4:8509f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509f78c r4:847a2480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d6000 r8:847a24ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2480 r8:8027ecf4 r7:ea9cde60 r6:847a2500 r5:850d6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48adfb0 to 0xe48adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027240 INFO: task kworker/1:334:3978 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dfce9000 dfd6b000 00000001 80239b98 7f841000 00000001 82ac11c4 82ac05a0 dd40: 7f841000 dfd6b000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84789440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84be3b8c r4:84be3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84be3b8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:3979 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e07ddd84 r8:00000002 r7:60000113 r6:e07ddd8c r5:850d6c00 r4:850d6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ab80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0755000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcff8c r4:84bcfc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcff8c r4:85075500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d6c00 r8:8507552c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075500 r8:8027ecf4 r7:ea9d1e60 r6:847a2580 r5:850d6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07ddfb0 to 0xe07ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85078dc0 INFO: task kworker/0:97:3979 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 7fb43000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:98:3981 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:98 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48b5d84 r8:00000002 r7:60000113 r6:e48b5d8c r5:850d3000 r4:850d3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48b5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8507ad80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0747000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bcfb8c r4:84bcf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bcfb8c r4:85075580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d3000 r8:850755ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85075580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075580 r8:8027ecf4 r7:e07dde60 r6:847a2600 r5:850d3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48b5fb0 to 0xe48b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507bfc0 INFO: task kworker/0:98:3981 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 7ff4c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:335:3982 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:335 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48edd84 r8:00000002 r7:60000113 r6:e48edd8c r5:850cd400 r4:850cd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850cd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850277c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8509ff8c r4:8509fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8509ff8c r4:847a2680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850cd400 r8:847a26ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2680 r8:8027ecf4 r7:ea9cde60 r6:847a2700 r5:850cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48edfb0 to 0xe48edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027540 INFO: task kworker/1:335:3982 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 7ff4c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:3983 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:3983 tgid:3983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48fdd84 r8:00000002 r7:60000013 r6:e48fdd8c r5:850e0000 r4:850e0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0051000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84328f8c r4:84328c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84328f8c r4:847a2800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e0000 r8:847a282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2800 r8:8027ecf4 r7:e48ede60 r6:847a2880 r5:850e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48fdfb0 to 0xe48fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027700 INFO: task kworker/1:336:3983 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 7ff4c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 90070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:3985 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e48d9d84 r8:00000002 r7:60000113 r6:e48d9d8c r5:850e0c00 r4:850e0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0469000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ac38c r4:850ac000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ac38c r4:847a2780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e0c00 r8:847a27ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2780 r8:8027ecf4 r7:e48fde60 r6:847a2900 r5:850e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48d9fb0 to 0xe48d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027840 INFO: task kworker/1:337:3985 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 803b4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:3987 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:3987 tgid:3987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:e8915d84 r8:00000002 r7:60000013 r6:e8915d8c r5:850e1800 r4:850e1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8915e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0499000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ac78c r4:850ac400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ac78c r4:847a2980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e1800 r8:847a29ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2980 r8:8027ecf4 r7:e48d9e60 r6:847a2a00 r5:850e1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8915fb0 to 0xe8915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027540 INFO: task kworker/1:338:3987 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 807b1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:3990 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9d5d84 r8:00000002 r7:60000113 r6:ea9d5d8c r5:850e2400 r4:850e2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ad38c r4:850ad000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ad38c r4:847a2a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e2400 r8:847a2aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2a80 r8:8027ecf4 r7:e8915e60 r6:847a2b00 r5:850e2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027a40 INFO: task kworker/1:339:3990 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 807b1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:3992 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9ddd84 r8:00000002 r7:60000113 r6:ea9ddd8c r5:850e3000 r4:850e3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850acb8c r4:850ac800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850acb8c r4:847a2b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e3000 r8:847a2bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2b80 r8:8027ecf4 r7:ea9d5e60 r6:847a2c00 r5:850e3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027a40 INFO: task kworker/1:340:3992 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 808b3000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:3994 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9e1d84 r8:00000002 r7:60000013 r6:ea9e1d8c r5:850e3c00 r4:850e3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85027f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850acf8c r4:850acc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850acf8c r4:847a2c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e3c00 r8:847a2cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2c80 r8:8027ecf4 r7:ea9d5e60 r6:847a2d00 r5:850e3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85027d80 INFO: task kworker/1:341:3994 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 80b67000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:3996 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:3996 tgid:3996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9e5d84 r8:00000002 r7:60000113 r6:ea9e5d8c r5:850e4800 r4:850e4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850830c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ad78c r4:850ad400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ad78c r4:847a2d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e4800 r8:847a2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a2d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a2d80 r8:8027ecf4 r7:ea9d5e60 r6:847a2e00 r5:850e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85083040 INFO: task kworker/1:342:3996 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 810b4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:3998 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:3998 tgid:3998 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9d9d84 r8:00000002 r7:60000013 r6:ea9d9d8c r5:850e6000 r4:850e6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850e6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0525000 r7:ddde2d40 r6:83018200 r5:850adf8c r4:847a2e80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:3999 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9edd84 r8:00000002 r7:60000113 r6:ea9edd8c r5:84b96c00 r4:84b96c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b96c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:84b96c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:850adb8c r4:847a2f80 Exception stack(0xea9edfb0 to 0xea9edff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe044dd20 to 0xe044dd68) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4004 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa05d84 r8:00000002 r7:60000113 r6:eaa05d8c r5:84848c00 r4:84848c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84848c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84848c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850aeb8c r4:850ae800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850aeb8c r4:847ba080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848c00 r8:847ba0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba080 r8:8027ecf4 r7:ea9fde60 r6:85075700 r5:84848c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa05fb0 to 0xeaa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850832c0 INFO: task kworker/1:346:4004 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Call trace: [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84848000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850af38c r4:850af000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850af38c r4:847ba180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848000 r8:847ba1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:850e6c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:00001000 r4:e05c5000 r4:847ba200 r4:850836c0 r4:82ac11e4 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850af78c r4:850af400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850af78c r4:847ba300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e5400 r8:847ba32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba300 r8:8027ecf4 r7:eaa11e60 r6:847ba380 r5:850e5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe044dd20 to 0xe044dd68) r5:80070013 r4:80239bb0 r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:00001000 r4:ee5d1000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:4013 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:850d8000 r4:850d8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0703000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850afb8c r4:850af800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850afb8c r4:847ba400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d8000 r8:847ba42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba400 r8:8027ecf4 r7:eaa15e60 r6:847ba480 r5:850d8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f1fb0 to 0xea9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850839c0 INFO: task kworker/1:351:4013 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 82350000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4015 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4015 tgid:4015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:850d9800 r4:850d9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850d9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85078c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0717000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850aff8c r4:850afc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850aff8c r4:847ba500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850d9800 r8:847ba52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba500 r8:8027ecf4 r7:ea9f1e60 r6:847ba580 r5:850d9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85083ac0 INFO: task kworker/1:352:4015 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8251c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:4018 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa1dd84 r8:00000002 r7:60000013 r6:eaa1dd8c r5:850da400 r4:850da400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850da400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85055380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850da400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0733000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b478c r4:850b4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b478c r4:847ba600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850da400 r8:847ba62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba600 r8:8027ecf4 r7:eaa21e60 r6:847ba680 r5:850da400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85055080 INFO: task kworker/1:353:4018 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 825c7000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:4020 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4020 tgid:4020 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa29d84 r8:00000002 r7:60000013 r6:eaa29d8c r5:850dbc00 r4:850dbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850dbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85055040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0725000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b438c r4:850b4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b438c r4:847ba700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dbc00 r8:847ba72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba700 r8:8027ecf4 r7:eaa1de60 r6:847ba780 r5:850dbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850552c0 INFO: task kworker/1:354:4020 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 827ad000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe044dfb0 to 0xe044dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 Call trace: r5:850dd400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85055940 r5:00001000 r4:e0763000 r7:ddde2d40 r6:83018200 r5:850b4b8c r4:847ba800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850dd400 r8:847ba82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba800 r8:8027ecf4 r7:eaa1de60 r6:847ba880 r5:850dd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa2dfb0 to 0xeaa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85055200 INFO: task kworker/1:355:4022 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 82bc5000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4023 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4023 tgid:4023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa31d84 r8:00000002 r7:60000113 r6:eaa31d8c r5:850db000 r4:850db000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850db000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850839c0 r5:850b578c r4:850b5400 r10:61c88647 r9:850db000 r8:847ba92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 82d90000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:99 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85049000 r7:dddced40 r6:83018000 r5:84bd1b8c r4:85075880 r10:00000000 r9:85075880 r8:8027ecf4 r7:e07dde60 r6:847baa00 r5:850dec00 r4:8507af80 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:850de000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08 r5:00001000 r4:e0791000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd038c r4:84bd0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd038c r4:85075900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850de000 r8:8507592c r7:82804d40 r6:dddced40 r5:dddced60 r4:85075900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85075900 r8:8027ecf4 r7:eaa3de60 r6:847baa80 r5:850de000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa39fb0 to 0xeaa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8507af80 INFO: task kworker/0:100:4027 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 832ac000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) task:kworker/1:357 state:D stack:0 pid:4029 tgid:4029 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85055b40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 837c8000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e07fb000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b538c r4:850b5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b538c r4:847bac00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850e9800 r8:847bac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847bac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bac00 r8:8027ecf4 r7:eaa31e60 r6:847bac80 r5:850e9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa4dfb0 to 0xeaa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85055c00 INFO: task kworker/1:358:4031 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 83b3a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:101:4033 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:4033 tgid:4033 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:850ea400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:102:4034 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:102 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa65d84 r8:00000002 r7:60000113 r6:eaa65d8c r5:850eb000 r4:850eb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850eb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:84789140 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaa69fb0 to 0xeaa69ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4039 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa6dd84 r8:00000002 r7:60000013 r6:eaa6dd8c r5:850ec800 r4:850ec800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ec800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84793500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0843000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b5f8c r4:850b5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b5f8c r4:847baf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ec800 r8:847baf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847baf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847baf00 r8:8027ecf4 r7:eaa69e60 r6:847baf80 r5:850ec800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84793200 INFO: task kworker/1:360:4039 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 842cd000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:361 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:eaa71d84 r8:00000002 r7:60000013 r6:eaa71d8c r5:850ed400 r4:850ed400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ed400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84793700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0851000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b638c r4:850b6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850b638c r4:847b0000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ed400 r8:847b002c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b0000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b0000 r8:8027ecf4 r7:eaa6de60 r6:847b0080 r5:850ed400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa71fb0 to 0xeaa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84793380 INFO: task kworker/1:361:4042 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:4043 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:850e8000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e48d1000 r7:ddde2d40 r6:83018200 r5:850b738c r4:847b0100 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4045 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:4045 tgid:4045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa81d84 r8:00000002 r7:60000113 r6:eaa81d8c r5:850ebc00 r4:850ebc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ebc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84793e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a4000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847b0200 r8:8027ecf4 r7:eaa7de60 r6:847b0280 r5:850ebc00 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0873000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:104:4048 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:104 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:850f0000 r4:850f0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85049b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd138c r4:84bd1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:364:4051 blocked for more than 457 seconds. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:850b6f8c r4:850b6c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4054 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8484e000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9280 r5:850b7f8c r4:850b7c00 r4:847b0480 Exception stack(0xeaa99fb0 to 0xeaa99ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:366:4055 blocked for more than 457 seconds. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84789140 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:850b7b8c r4:850b7800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:847a6d80 INFO: task kworker/1:368:4060 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:8484b000 r4:8484b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8484b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e96c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8484b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd0f8c r4:84bd0c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84bd0f8c r4:847b0600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484b000 r8:847b062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b0600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b0600 r8:8027ecf4 r7:eaa99e60 r6:85075d80 r5:8484b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:ee5d1000 Exception stack(0xe044dfb0 to 0xe044dff8) Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:8511c38c r4:847b0680 r4:847e9100 dd20: 8625b000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:4063 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9540 r4:00000001 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eaacb000 r10:61c88647 r9:850f2400 r8:847b07ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e9340 INFO: task kworker/1:371:4065 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Not tainted 6.15.0-syzkaller #0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511d78c r4:8511d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511d78c r4:847b0880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f3c00 r8:847b08ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b0880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b0880 r8:8027ecf4 r7:eaab1e60 r6:847b0900 r5:850f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:850f4800 r8:847b09ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe044dd20 to 0xe044dd68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:850f5400 r8:847b0aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b0a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b0a80 r8:8027ecf4 r7:eaac9e60 r6:847b0b00 r5:850f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e9900 INFO: task kworker/1:374:4073 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 87063000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8511df8c r4:847b0b80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r5:850f6c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fd300 Exception stack(0xeaae5fb0 to 0xeaae5ff8) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8743b000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4079 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:850f3000 r4:850f3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e38c r4:8511e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511e38c r4:847b0d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f3000 r8:847b0dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b0d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b0d80 r8:8027ecf4 r7:eaae5e60 r6:847b0e00 r5:850f3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e9e80 INFO: task kworker/1:377:4079 is blocked on a mutex likely owned by task kworker/1:209:3661. Workqueue: events bpf_prog_free_deferred dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 r4:850f1800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8511e78c r4:8511e400 r10:00000000 r9:847b0e80 r8:8027ecf4 r7:eaae5e60 r6:847b0f00 r5:850f1800 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:00001000 r4:ee5d1000 r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:4083 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:850f0c00 r4:850f0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850f0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fd040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511eb8c r4:8511e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511eb8c r4:847b0f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850f0c00 r8:847b0fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847b0f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b0f80 r8:8027ecf4 r7:eaae5e60 r6:85100000 r5:850f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fd080 INFO: task kworker/1:379:4083 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 87c0d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:380:4085 blocked for more than 457 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85100080 r8:8027ecf4 r7:eaae5e60 r6:85100100 r5:850ee000 r4:850fd180 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4087 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaaf9d84 r8:00000002 r7:60000113 r6:eaaf9d8c r5:850eec00 r4:850eec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850eec00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fda80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ff8c r4:8511fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511ff8c r4:85100180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850eec00 r8:851001ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100180 r8:8027ecf4 r7:eaaf5e60 r6:85100200 r5:850eec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fd340 INFO: task kworker/1:381:4087 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 87c0d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495af8c r4:8495ac00 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:382:4089 blocked for more than 457 seconds. r5:84a08000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fd5c0 r7:ddde2d40 r6:83018200 r5:8511f78c r4:85100280 Exception stack(0xeaafdfb0 to 0xeaafdff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8511fb8c r4:8511f800 r4:85100380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100380 r8:8027ecf4 r7:eaaf9e60 r6:85100400 r5:84a09800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fd600 INFO: task kworker/1:383:4091 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 88670000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4094 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fdc40 r7:ddde2d40 r6:83018200 r5:8516038c r4:85100480 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:84a0a400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeab05fb0 to 0xeab05ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 891b9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:4098 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:84a0c800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e0623000 r10:61c88647 r9:84a0c800 r8:851006ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fdb40 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 r10:829189c0 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:84a0d400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85075f00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:4100 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4100 tgid:4100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:84a0bc00 r4:84a0bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a0bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fd500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e012b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85160b8c r4:85160800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85160b8c r4:85100780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0bc00 r8:851007ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100780 r8:8027ecf4 r7:eab0de60 r6:85100880 r5:84a0bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850fde80 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8516178c r4:85161400 r4:85100900 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101080 INFO: task kworker/1:388:4103 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8a115000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:389:4105 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:389 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:844e3c00 r4:844e3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516138c r4:85161000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516138c r4:85100980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e3c00 r8:851009ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100980 r8:8027ecf4 r7:eab19e60 r6:85108000 r5:844e3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851012c0 Workqueue: events bpf_prog_free_deferred dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a0e000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeab01fb0 to 0xeab01ff8) Workqueue: events bpf_prog_free_deferred dd20: 8a5fc000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:4110 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab25d84 r8:00000002 r7:60000013 r6:eab25d8c r5:85120c00 r4:85120c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85120c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85120c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516238c r4:85162000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516238c r4:85100b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120c00 r8:85100b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100b00 r8:8027ecf4 r7:eab01e60 r6:85100b80 r5:85120c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101080 Workqueue: events bpf_prog_free_deferred dd20: 8a753000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:84789140 task:kworker/1:392 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:00001000 r4:e06d1000 r7:ddde2d40 r6:83018200 r5:85161f8c r4:85100c00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r4:00000000 r5:8495af8c r4:8495ac00 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:393 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab31d84 r8:00000002 r7:60000113 r6:eab31d8c r5:85123000 r4:85123000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85123000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85123000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea997000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85162b8c r4:85162800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85162b8c r4:85100d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123000 r8:85100d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100d00 r8:8027ecf4 r7:eab25e60 r6:85100d80 r5:85123000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab31fb0 to 0xeab31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101a00 INFO: task kworker/1:393:4113 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8a8d9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e075f000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8acf6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4117 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:844e4800 r4:844e4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85101f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8973000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516278c r4:85162400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516278c r4:85100e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e4800 r8:85100eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100e80 r8:8027ecf4 r7:eab31e60 r6:85108100 r5:844e4800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:107:4118 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:4118 tgid:4118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab2dd84 r8:00000002 r7:60000113 r6:eab2dd8c r5:844e5400 r4:844e5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0749000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd238c r4:84bd2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd238c r4:85108180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e5400 r8:851081ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85108180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85108180 r8:8027ecf4 r7:eab35e60 r6:85108200 r5:844e5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85049700 INFO: task kworker/0:107:4118 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8aec9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:4122 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab49d84 r8:00000002 r7:60000113 r6:eab49d8c r5:844e6000 r4:844e6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fde80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85162f8c r4:85162c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85162f8c r4:85100f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e6000 r8:85100f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100f00 r8:8027ecf4 r7:eab31e60 r6:85108280 r5:844e6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fdd00 INFO: task kworker/1:395:4122 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8b460000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4123 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4123 tgid:4123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab4dd84 r8:00000002 r7:60000113 r6:eab4dd8c r5:844e3000 r4:844e3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516338c r4:85163000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516338c r4:85100f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e3000 r8:85100fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85100f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85100f80 r8:8027ecf4 r7:eab49e60 r6:85108300 r5:844e3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab4dfb0 to 0xeab4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fdd00 INFO: task kworker/1:396:4123 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8b460000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4124 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:844e6c00 r4:844e6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851072c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516378c r4:85163400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516378c r4:85102000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e6c00 r8:8510202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102000 r8:8027ecf4 r7:eab4de60 r6:85108380 r5:844e6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85101e40 INFO: task kworker/1:397:4124 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8be3a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4126 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:4126 tgid:4126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab59d84 r8:00000002 r7:60000113 r6:eab59d8c r5:844e0c00 r4:844e0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844e0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107400 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85102080 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85107080 INFO: task kworker/1:398:4126 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8be3a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:4129 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:4129 tgid:4129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab75d84 r8:00000002 r7:60000013 r6:eab75d8c r5:8484a400 r4:8484a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85163f8c r4:85102100 Exception stack(0xeab75fb0 to 0xeab75ff8) Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851077c0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4132 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:401 state:D stack:0 pid:4132 tgid:4132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab39d84 r8:00000002 r7:60000013 r6:eab39d8c r5:85120000 r4:85120000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85120000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85120000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516838c r4:85168000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516838c r4:85102200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120000 r8:8510222c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102200 r8:8027ecf4 r7:eab8de60 r6:85102280 r5:85120000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85107300 INFO: task kworker/1:401:4132 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8c6be000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 r4:85124800 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85168b8c r4:85102300 Exception stack(0xeab81fb0 to 0xeab81ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4137 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab9dd84 r8:00000002 r7:60000013 r6:eab9dd8c r5:85125400 r4:85125400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85125400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85125400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85168f8c r4:85168c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85168f8c r4:85102400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85125400 r8:8510242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102400 r8:8027ecf4 r7:eab81e60 r6:85102480 r5:85125400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851075c0 INFO: task kworker/1:403:4137 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8cc4c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4139 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab3dd84 r8:00000002 r7:60000113 r6:eab3dd8c r5:85126c00 r4:85126c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85126c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85107e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85126c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516978c r4:85169400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516978c r4:85102500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeab3dfb0 to 0xeab3dff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8cc4c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8495af8c r4:8495ac00 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:405 state:D stack:0 pid:4141 tgid:4141 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8516938c r4:85169000 r10:61c88647 r9:85123c00 r8:8510262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102600 r8:8027ecf4 r7:eab3de60 r6:85102680 r5:85123c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85107780 INFO: task kworker/1:405:4141 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:406:4142 blocked for more than 458 seconds. [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85169b8c r4:85169800 r4:85102700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:00000000 r5:8495af8c r4:8495ac00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851019c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85169f8c r4:85169c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85169f8c r4:85102800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08c00 r8:8510282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102800 r8:8027ecf4 r7:eabbde60 r6:85102880 r5:84a08c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85107dc0 INFO: task kworker/1:407:4145 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8d7ba000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8516a38c r4:8516a000 r4:85102900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4149 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85128000 r4:85128000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85128000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85128000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85128000 r8:85102a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4150 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4150 tgid:4150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:85128c00 r4:85128c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85128c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850812c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85128c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516a78c r4:8516a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516a78c r4:85102b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128c00 r8:85102b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8516af8c r4:8516ac00 r10:00000000 r9:85102c00 r8:8027ecf4 r7:eabe1e60 r6:85102c80 r5:85129800 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8e7ab000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4155 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac05d84 r8:00000002 r7:60000013 r6:eac05d8c r5:8512a400 r4:8512a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8516b38c r4:8516b000 r10:00000000 r9:85102d00 r8:8027ecf4 r7:eabf9e60 r6:85102d80 r5:8512a400 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eac11d84 r8:00000002 r7:60000113 r6:eac11d8c r5:8512b000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:8516b78c r4:8516b400 r4:85102e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4159 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac1dd84 r8:00000002 r7:60000013 r6:eac1dd8c r5:8512bc00 r4:8512bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516bb8c r4:8516b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8516bb8c r4:85102f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512bc00 r8:85102f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85102f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85102f00 r8:8027ecf4 r7:eac11e60 r6:85102f80 r5:8512bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac1dfb0 to 0xeac1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85081800 INFO: task kworker/1:414:4159 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8f0c8000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8517538c r4:85175000 r10:00000000 r9:85039000 r8:8027ecf4 r7:eac1de60 r6:85039080 r5:8512c800 r4:850818c0 Call trace: Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8f0c8000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4163 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:416 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac35d84 r8:00000002 r7:60000013 r6:eac35d8c r5:8512d400 r4:8512d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8512d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512d400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516bf8c r4:8516bc00 r7:ddde2d40 r6:83018200 r5:8516bf8c r4:85039100 Exception stack(0xeac35fb0 to 0xeac35ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r4:00000000 r5:00001000 r4:df9ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517438c r4:85174000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517438c r4:85039200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512e000 r8:8503922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85039200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039200 r8:8027ecf4 r7:eac29e60 r6:85039280 r5:8512e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85081b80 INFO: task kworker/1:417:4165 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8f73d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 task:kworker/1:418 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85081f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8512ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517478c r4:85174400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517478c r4:85039300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512ec00 r8:8503932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85039300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039300 r8:8027ecf4 r7:eac29e60 r6:85039380 r5:8512ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85081dc0 INFO: task kworker/1:418:4167 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r5:80070013 r4:80239bb0 r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:84840000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033040 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4171 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac41d84 r8:00000002 r7:60000013 r6:eac41d8c r5:84842400 r4:84842400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84842400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84842400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85174f8c r4:85174c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85174f8c r4:85039480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84842400 r8:850394ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85039480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039480 r8:8027ecf4 r7:eac29e60 r6:85108600 r5:84842400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850331c0 INFO: task kworker/1:420:4171 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 8fe11000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:421:4173 blocked for more than 458 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8517578c r4:85175400 r10:00000000 r9:85039500 r8:8027ecf4 r7:eac29e60 r6:85108680 r5:84843000 r4:850332c0 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85039580 Exception stack(0xeac3dfb0 to 0xeac3dff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:85131800 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033800 r10:61c88647 r9:85131800 r8:850396ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85039680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039680 r8:8027ecf4 r7:eac3de60 r6:85039700 r5:85131800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85033480 INFO: task kworker/1:423:4178 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9087f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 INFO: task kworker/1:424:4179 blocked for more than 458 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85039780 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:425 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85133000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517638c r4:85176000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517638c r4:85039800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85133000 r8:8503982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85039800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039800 r8:8027ecf4 r7:eac39e60 r6:85039880 r5:85133000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85033940 INFO: task kworker/1:425:4180 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9087f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe044dfb0 to 0xe044dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe044dd20 to 0xe044dd68) dd20: 90d05000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:4185 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac55d84 r8:00000002 r7:60000013 r6:eac55d8c r5:85134800 r4:85134800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85134800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85033e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85134800 r8:85039a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4187 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85135400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:82ac11e4 r4:00000000 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:85136000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:85136000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:85136000 r8:85039c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85109fc0 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:4192 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:430 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:85136c00 r4:85136c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85136c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851960c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85136c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177b8c r4:85177800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85177b8c r4:85039d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136c00 r8:85039d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85039d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85039d00 r8:8027ecf4 r7:eac61e60 r6:85039d80 r5:85136c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85196000 INFO: task kworker/1:430:4192 is blocked on a mutex likely owned by task kworker/1:209:3661. Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4193 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac59d84 r8:00000002 r7:60000013 r6:eac59d8c r5:85130000 r4:85130000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85130000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85130000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8518038c r4:85180000 r4:85039f00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:433 state:D stack:0 pid:4197 tgid:4197 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85138000 r8:8519502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851962c0 INFO: task kworker/1:433:4197 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 921e1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4199 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:4199 tgid:4199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:8513b000 r4:8513b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071b000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4201 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac6dd84 r8:00000002 r7:60000113 r6:eac6dd8c r5:8513bc00 r4:8513bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fa180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8513bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518138c r4:85181000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518138c r4:85195200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513bc00 r8:8519522c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r5:80070013 r4:80239bb0 r4:e044ddc0 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8513c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac85fb0 to 0xeac85ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8513d400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0875000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd338c r4:84bd3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd338c r4:85108780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513d400 r8:851087ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85108780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85108780 r8:8027ecf4 r7:eab35e60 r6:85195400 r5:8513d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850477c0 INFO: task kworker/0:108:4206 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 927a0000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:109:4207 blocked for more than 458 seconds. r5:8513e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r9:83018005 r8:8513e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r4:e044ddc0 r4:00000000 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:110 state:D stack:0 pid:4209 tgid:4209 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8513ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8513ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e085d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd2f8c r4:84bd2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84bd2f8c r4:85108880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513ec00 r8:851088ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85108880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85108880 r8:8027ecf4 r7:eac91e60 r6:85195500 r5:8513ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85047a00 INFO: task kworker/0:110:4209 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85181b8c r4:85181800 r10:61c88647 r9:85139800 r8:851955ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:438:4213 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:438 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:8513a400 r4:8513a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8513a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0807000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 r4:847a6d80 r4:84789140 r4:85140c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:85140c00 r8:851957ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 937d5000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:4217 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaca5d84 r8:00000002 r7:60000013 r6:eaca5d8c r5:85141800 r4:85141800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85141800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85181f8c r4:85181c00 r10:61c88647 r9:85141800 r8:851958ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85143000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 94179000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85143c00 r4:829189bc r4:00000000 r5:00001000 r4:e48f9000 r4:85195a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85195a00 r8:8027ecf4 r7:eac81e60 r6:85195a80 r5:85143c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fa940 INFO: task kworker/1:441:4222 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 94179000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/0:112:4223 blocked for more than 459 seconds. r5:85144800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eacc1d84 r8:00000002 r7:60000013 r6:eacc1d8c r5:85142400 r4:85142400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85142400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85142400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b0b8c r4:851b0800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b0b8c r4:85108a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85142400 r8:85108a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85108a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85108a00 r8:8027ecf4 r7:eacbde60 r6:85195b80 r5:85142400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc1fb0 to 0xeacc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85047e80 INFO: task kworker/0:113:4225 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9478e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85146000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85182b8c r4:85195c00 Exception stack(0xeacc5fb0 to 0xeacc5ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:4230 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaccdd84 r8:00000002 r7:60000113 r6:eaccdd8c r5:85146c00 r4:85146c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85146c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:85146c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 r10:61c88647 r9:85146c00 r8:85108aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85047f80 Call trace: Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85145400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:444:4234 blocked for more than 459 seconds. r4:85148c00 r5:85148c00 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:445 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eacd9d84 r8:00000002 r7:60000113 r6:eacd9d8c r5:8514a400 r4:8514a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8514a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518338c r4:85183000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518338c r4:85195f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514a400 r8:85195fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85195f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85195f80 r8:8027ecf4 r7:eacd1e60 r6:847cf000 r5:8514a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fb480 INFO: task kworker/1:445:4235 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 957ea000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r5:8495af8c r4:8495ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eacddd84 r8:00000002 r7:60000013 r6:eacddd8c r5:85148000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:85148000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 r10:61c88647 r9:85148000 r8:847cf0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4240 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:8514b000 r4:8514b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8514b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbb00 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847cf180 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe044dd20 to 0xe044dd68) dd20: 959e7000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84846c00 r5:84846c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847cf280 r8:8027ecf4 r7:eacc9e60 r6:85108b00 r5:84846c00 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84845400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbcc0 r7:ddde2d40 r6:83018200 r5:8518c38c r4:847cf300 Exception stack(0xeace9fb0 to 0xeace9ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:8495af8c r4:8495ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:450:4245 blocked for more than 459 seconds. r4:84844800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84844800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fbac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84844800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518c78c r4:8518c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518c78c r4:847cf380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84844800 r8:847cf3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cf380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf380 r8:8027ecf4 r7:eace5e60 r6:85108c00 r5:84844800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fbd40 INFO: task kworker/1:450:4245 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9624c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84841800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847cf400 r8:8027ecf4 r7:eace5e60 r6:85108c80 r5:84841800 r4:850fbc80 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4249 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead15d84 r8:00000002 r7:60000113 r6:ead15d8c r5:84843c00 r4:84843c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84843c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84843c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518cf8c r4:8518cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518cf8c r4:847cf480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84843c00 r8:847cf4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cf480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf480 r8:8027ecf4 r7:eace5e60 r6:85108d00 r5:84843c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:452:4249 is blocked on a mutex likely owned by task kworker/1:209:3661. r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844e0000 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85047400 INFO: task kworker/1:453:4251 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 966f1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ee5d1000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:454 state:D stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84840c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e044ddc0 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84810c00 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fb340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84810c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead31000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518db8c r4:8518d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518db8c r4:847cf600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810c00 r8:847cf62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cf600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf600 r8:8027ecf4 r7:eace5e60 r6:85108e80 r5:84810c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead3dfb0 to 0xead3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850faf40 INFO: task kworker/1:455:4255 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 96b6c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6d80 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:456:4257 blocked for more than 459 seconds. r5:84810000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xead55fb0 to 0xead55ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ead49d84 r8:00000002 r7:60000013 r6:ead49d8c r5:84812400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08 r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r10:61c88647 r9:84812400 r8:85108fac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ab80 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:116:4264 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:116 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab41d84 r8:00000002 r7:60000113 r6:eab41d8c r5:84813000 r4:84813000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84813000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519ae40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8498e78c r4:8498e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8498e78c r4:8519f080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813000 r8:8519f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f080 r8:8027ecf4 r7:eacc1e60 r6:8519f100 r5:84813000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab41fb0 to 0xeab41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8519ab80 INFO: task kworker/0:116:4264 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:117 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519a840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84814800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b038c r4:851b0000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b038c r4:8519f180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84814800 r8:8519f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f180 r8:8027ecf4 r7:eacc1e60 r6:8519f200 r5:84814800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8519aec0 INFO: task kworker/0:117:4267 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9779e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84815400 r5:84815400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84816c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847cf700 r8:8027ecf4 r7:eace5e60 r6:8519f380 r5:84816c00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a12c0 INFO: task kworker/1:457:4271 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 97be7000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4272 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab6dd84 r8:00000002 r7:60000113 r6:eab6dd8c r5:84811800 r4:84811800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84811800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8518e78c r4:8518e400 r4:847cf780 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:4273 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab7dd84 r8:00000002 r7:60000013 r6:eab7dd8c r5:84846000 r4:84846000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84846000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2780 r7:dddced40 r6:83018000 r5:851b138c r4:8519f480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:120:4275 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84938000 r5:84938000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84938000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r10:61c88647 r9:84938000 r8:8519f5ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:121:4276 blocked for more than 459 seconds. r5:84938c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b178c r4:851b1400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b178c r4:8519f680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938c00 r8:8519f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f680 r8:8027ecf4 r7:eab7de60 r6:8519f700 r5:84938c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a26c0 INFO: task kworker/0:121:4276 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 987ac000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8493a400 r5:8493a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851b1b8c r4:851b1800 r10:00000000 r9:8519f780 r8:8027ecf4 r7:eab99e60 r6:8519f800 r5:8493a400 INFO: task kworker/0:122:4278 is blocked on a mutex likely owned by task kworker/1:209:3661. dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8493b000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b1f8c r4:851b1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b1f8c r4:8519f880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493b000 r8:8519f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f880 r8:8027ecf4 r7:eaba5e60 r6:8519f900 r5:8493b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a2000 INFO: task kworker/0:123:4279 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 98d62000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8493bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df885e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8493bc00 r8:8519f9ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:125:4284 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:125 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:8493c800 r4:8493c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8493c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a2e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe044dd20 to 0xe044dd68) r4:82ac11e4 r4:e044ddc0 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:126:4287 blocked for more than 459 seconds. r5:8493d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:830cbc00 r7:dddced40 r6:83018000 r5:851b2b8c r4:8519fb80 Exception stack(0xeabd1fb0 to 0xeabd1ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:127:4290 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:127 state:D stack:0 pid:4290 tgid:4290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:8493e000 r4:8493e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8493e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519a240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493e000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b2f8c r4:851b2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b2f8c r4:8519fc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493e000 r8:8519fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fc80 r8:8027ecf4 r7:eabd1e60 r6:8519fd00 r5:8493e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:00001000 r4:ee5d1000 r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:129:4293 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:129 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:84939800 r4:84939800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84939800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85196940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84939800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e891f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b338c r4:851b3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b338c r4:8519fe80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84939800 r8:8519feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fe80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fe80 r8:8027ecf4 r7:eabe9e60 r6:8519ff00 r5:84939800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf5fb0 to 0xeabf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474ac40 INFO: task kworker/0:129:4293 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 99cf9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:8324c800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r9:83018005 r8:8324c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r10:61c88647 r9:8324c800 r8:8519ffac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84816000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85029140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84816000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8975000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b3b8c r4:851b3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851b3b8c r4:8504e080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84816000 r8:8504e0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8504e080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504e080 r8:8027ecf4 r7:eac01e60 r6:8504e100 r5:84816000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85029080 INFO: task kworker/0:131:4297 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9a60f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84813c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84813c00 r8:8504e1ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:133 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bc78c r4:851bc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851bc78c r4:8504e280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c0000 r8:8504e2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8504e280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504e280 r8:8027ecf4 r7:eac19e60 r6:8504e300 r5:848c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85029380 INFO: task kworker/0:133:4301 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9a8dd000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:4302 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:4302 tgid:4302 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:eabc5d84 r8:00000002 r7:60000013 r6:eabc5d8c r5:848c1800 r5:848c1800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848c1800 r8:8504e3ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/0:135:4304 blocked for more than 459 seconds. r5:848c2400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848c2400 r8:8504e4ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xead59fb0 to 0xead59ff8) r4:85029500 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4307 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:4307 tgid:4307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead65d84 r8:00000002 r7:60000113 r6:ead65d8c r5:848c3c00 r4:848c3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518ff8c r4:8518fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518ff8c r4:847cf800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c3c00 r8:847cf82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cf800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf800 r8:8027ecf4 r7:eab65e60 r6:8504e580 r5:848c3c00 Exception stack(0xead65fb0 to 0xead65ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:848c3000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8518ef8c r4:8518ec00 r4:847cf880 Exception stack(0xead69fb0 to 0xead69ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9b238000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:4311 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:4311 tgid:4311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead6dd84 r8:00000002 r7:60000013 r6:ead6dd8c r5:848c5400 r4:848c5400 r5:848c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848c6000 r8:8504e7ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:4315 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:848c4800 r4:848c4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d08c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851bdf8c r4:851bdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851bdf8c r4:8504e880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c4800 r8:8504e8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8504e880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504e880 r8:8027ecf4 r7:eabc5e60 r6:8504e900 r5:848c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d0100 INFO: task kworker/0:138:4315 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9ba39000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495af8c r4:8495ac00 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84940000 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a1440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84940000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead81000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518f38c r4:8518f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518f38c r4:847cf900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84940000 r8:847cf92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cf900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf900 r8:8027ecf4 r7:ead65e60 r6:8504e980 r5:84940000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead89fb0 to 0xead89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a1dc0 INFO: task kworker/1:461:4317 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9bef6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e044ddc0 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:ead99d84 r8:00000002 r7:60000113 r6:ead99d8c r5:84941800 r5:84941800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84941800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518fb8c r4:8518f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8518fb8c r4:847cf980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84941800 r8:847cf9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cf980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cf980 r8:8027ecf4 r7:ead65e60 r6:8504ea00 r5:84941800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead99fb0 to 0xead99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a1940 INFO: task kworker/1:462:4319 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84942400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:e044ddc0 r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:84943000 r4:84943000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84943000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84943000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851be38c r4:851be000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851be38c r4:8504eb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84943000 r8:8504ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:8504eb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504eb80 r8:8027ecf4 r7:ead79e60 r6:8504ec00 r5:84943000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d0780 INFO: task kworker/0:140:4323 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9c731000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84943c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d07c0 INFO: task kworker/0:141:4325 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9c731000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:84944800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8504ed80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:80070013 r4:80239bb0 r4:e044ddc0 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:84945400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0d00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847d0b00 INFO: task kworker/0:143:4329 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9ca19000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6d80 INFO: task kworker/0:144:4331 blocked for more than 459 seconds. r5:84946000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0e80 5fa0: 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bb0 r5:00001000 r4:ee5d1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:4332 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:84940c00 r4:84940c00 r5:84940c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r7:dddced40 r6:83018000 r5:851bfb8c r4:85038080 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:848c6c00 r4:829189bc [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506f3c0 INFO: task kworker/1:463:4338 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9d0dc000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:4339 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84188000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:464:4339 is blocked on a mutex likely owned by task kworker/1:209:3661. dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:465 state:D stack:0 pid:4340 tgid:4340 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9da63000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4342 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:8514bc00 r4:8514bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8514bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506f940 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:467:4346 blocked for more than 460 seconds. r5:8514d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85224f8c r4:847cfd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514d400 r8:847cfd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cfd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cfd00 r8:8027ecf4 r7:ead09e60 r6:847cfd80 r5:8514d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadedfb0 to 0xeadedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506fa40 INFO: task kworker/1:467:4346 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9dcd9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8514c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8522538c r4:85225000 r4:847cfe00 5fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:4348 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:85149800 r5:85149800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851bf78c r4:851bf400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851bf78c r4:85038280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85149800 r8:850382ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85038280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85038280 r8:8027ecf4 r7:eac31e60 r6:847cff00 r5:85149800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadf1fb0 to 0xeadf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85025240 INFO: task kworker/0:146:4348 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:469:4349 blocked for more than 460 seconds. r5:85140000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:4351 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:85150000 r5:85150000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0527000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522578c r4:85225400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8522578c r4:830cd400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:830cd42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd400 r8:8027ecf4 r7:eadf5e60 r6:830cd380 r5:85150000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8506ffc0 INFO: task kworker/1:470:4351 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eae01d84 r8:00000002 r7:60000013 r6:eae01d8c r5:85152400 r5:85152400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0f00 r7:ddde2d40 r6:83018200 r5:85225b8c r4:8419fd80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r5:85150c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f90c0 r7:ddde2d40 r6:83018200 r5:85225f8c r4:850f8080 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:4359 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:4359 tgid:4359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:85153000 r4:85153000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85153000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85153000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522638c r4:85226000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85153000 r8:850f81ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85153c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850f8280 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae05d84 r8:00000002 r7:60000013 r6:eae05d8c r5:85154800 r4:85154800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85154800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f96c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85154800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0727000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85226b8c r4:85226800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85226b8c r4:850f8380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85154800 r8:850f83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850f8380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f8380 r8:8027ecf4 r7:eadf5e60 r6:850f8400 r5:85154800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850f9600 INFO: task kworker/1:475:4363 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9f127000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4366 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4366 tgid:4366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85155400 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeae11fb0 to 0xeae11ff8) Exception stack(0xe044dd20 to 0xe044dd68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85156000 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 r5:8495af8c r4:8495ac00 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4368 blocked for more than 460 seconds. r5:85156c00 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523078c r4:850f8680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156c00 r8:850f86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850f8680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f8680 r8:8027ecf4 r7:eadf5e60 r6:850f8700 r5:85156c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84789140 r4:8514ec00 r5:8514ec00 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850f9b40 INFO: task kworker/1:479:4370 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: 9fd5e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:480 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:83b51800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeae21fb0 to 0xeae21ff8) Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85260c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4375 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae2dd84 r8:00000002 r7:60000013 r6:eae2dd8c r5:85260000 r4:85260000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85260000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a5180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85260000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8523038c r4:85230000 dfa0: 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bb0 r5:00001000 r4:ee5d1000 r4:00000001 INFO: task kworker/0:148:4378 blocked for more than 460 seconds. r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a04d3000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:482 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a5280 INFO: task kworker/1:482:4379 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8418bc00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8523138c r4:850f8c80 Exception stack(0xeae1dfb0 to 0xeae1dff8) INFO: task kworker/1:483:4381 is blocked on a mutex likely owned by task kworker/1:209:3661. r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85263c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85230f8c r4:850f8d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85263c00 r8:850f8d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850f8d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f8d00 r8:8027ecf4 r7:eae1de60 r6:850f8d80 r5:85263c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a5440 INFO: task kworker/1:484:4383 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a0e72000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 INFO: task kworker/0:149:4387 blocked for more than 460 seconds. r5:85265400 r4:829189bc r4:00000000 r10:61c88647 r9:85265400 r8:8503862c r7:82804d40 r6:dddced40 r5:dddced60 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:ee5d1000 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4389 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae41d84 r8:00000002 r7:60000013 r6:eae41d8c r5:85262400 r4:85262400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85262400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:61c88647 r9:85262400 r8:850f8eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4391 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85266000 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:851a5b80 r5:80070013 r4:80239bb0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 r5:85266c00 r4:829189bc [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a5c80 INFO: task kworker/1:487:4394 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a197d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 r5:00001000 r4:ee5d1000 r4:00000001 task:kworker/1:488 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 r5:8418e000 r4:829189bc r4:00000000 r10:61c88647 r9:8418e000 r8:8519722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Call trace: r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4399 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae51d84 r8:00000002 r7:60000013 r6:eae51d8c r5:85264800 r5:85264800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:847a6d80 INFO: task kworker/1:491:4400 blocked for more than 460 seconds. r5:85151800 r4:829189bc [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:4402 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae61d84 r8:00000002 r7:60000113 r6:eae61d8c r5:85268000 r4:85268000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85268000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85268000 r8:850385ac r7:82804d40 r6:dddced40 r5:dddced60 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:ee5d1000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85268c00 r4:829189bc r4:00000000 r7:ddde2d40 r6:83018200 r5:8523338c r4:85197500 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:8526a400 r4:8526a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8526a400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523c78c r4:8523c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523c78c r4:85197600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526a400 r8:8519762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85197600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85197600 r8:8027ecf4 r7:eae75e60 r6:85197680 r5:8526a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 r5:8526b000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a77c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8526b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523378c r4:85233400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523378c r4:85197700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8526b000 r8:8519772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851a75c0 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a2d90000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:85269800 r4:829189bc r9:83018205 r8:85269800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r10:61c88647 r9:85269800 r8:8519792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85197900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85197900 r8:8027ecf4 r7:eae81e60 r6:85197980 r5:85269800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a7700 INFO: task kworker/1:496:4411 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a30a2000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8526e000 r4:829189bc r4:00000000 r5:00001000 r4:dfc47000 r4:00000001 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4417 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4417 tgid:4417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:8526d400 r4:8526d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8526d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a7dc0 INFO: task kworker/1:498:4417 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a355c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 Exception stack(0xe044dfb0 to 0xe044dff8) [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8526ec00 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:851cd38c r4:85038680 r4:851f1480 Exception stack(0xe044dd20 to 0xe044dd68) r4:00000000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:4420 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:4420 tgid:4420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eae99d84 r8:00000002 r7:60000113 r6:eae99d8c r5:8418ec00 r4:8418ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8418ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:851ce38c r4:851ce000 Exception stack(0xeae99fb0 to 0xeae99ff8) [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:ee5d1000 Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r7:dddced40 r6:83018000 r5:851cd78c r4:85038800 INFO: task kworker/0:153:4422 is blocked on a mutex likely owned by task kworker/1:209:3661. r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523cf8c r4:8523cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523cf8c r4:85197c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84188c00 r8:85197cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85197c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85197c80 r8:8027ecf4 r7:eae91e60 r6:85038900 r5:84188c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851ed040 INFO: task kworker/1:499:4424 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 task:kworker/1:500 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:848c0c00 r8:85197d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4428 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4428 tgid:4428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84946c00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:85197d80 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:502:4430 blocked for more than 460 seconds. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:8418b000 r8:85197e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84189800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:85197e80 r4:851ed480 Exception stack(0xe044dd20 to 0xe044dd68) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r5:84298c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ed900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84298c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523df8c r4:8523dc00 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84298000 r4:829189bc r4:00000000 r5:00001000 r4:e06cf000 r4:00000001 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8957000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523e78c r4:8523e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523e78c r4:851f8000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85270c00 r8:851f802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8000 r8:8027ecf4 r7:eaec1e60 r6:851f8080 r5:85270c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851ed8c0 INFO: task kworker/1:506:4438 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a58e5000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:4441 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:85271800 r4:85271800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85271800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8523eb8c r4:8523e800 r4:851f8100 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a58e5000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:154:4443 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:84299800 r4:84299800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84299800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f9bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85038c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:508:4445 blocked for more than 460 seconds. r4:8429b000 r5:8429b000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3040 r7:ddde2d40 r6:83018200 r5:8523f78c r4:851f8200 Exception stack(0xeaf09fb0 to 0xeaf09ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8429bc00 r5:8429bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8429bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523ff8c r4:8523fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523ff8c r4:851f8280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429bc00 r8:851f82ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8280 r8:8027ecf4 r7:eaf09e60 r6:85038e00 r5:8429bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851edcc0 INFO: task kworker/1:509:4446 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a5ff5000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8429d400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:8429d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r10:61c88647 r9:8429d400 r8:85038eac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:510:4451 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:510 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:8429ec00 r4:8429ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8429ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8429ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8523fb8c r4:8523f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8523fb8c r4:851f8300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429ec00 r8:851f832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8300 r8:8027ecf4 r7:eaf0de60 r6:85038f80 r5:8429ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851f3180 INFO: task kworker/1:510:4451 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8429e000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf3de08 r9:83018205 r8:8429e000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:8429e000 r8:851f83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851f3400 INFO: task kworker/1:511:4453 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a6ab4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:512 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8429c800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851f8400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851f32c0 INFO: task kworker/1:512:4455 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a6ab4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 r5:8495af8c r4:8495ac00 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:513 state:D stack:0 pid:4456 tgid:4456 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85273c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:851f32c0 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:514:4459 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:514 state:D stack:0 pid:4459 tgid:4459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:85274800 r4:85274800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85274800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f3840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85274800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead61000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85244b8c r4:85244800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85244b8c r4:851f8580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85274800 r8:851f85ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8580 r8:8027ecf4 r7:eaf4de60 r6:851f8600 r5:85274800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851f3480 INFO: task kworker/1:514:4459 is blocked on a mutex likely owned by task kworker/1:209:3661. r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf55d84 r8:00000002 r7:60000013 r6:eaf55d8c r5:85275400 r4:85275400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85275400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eada7000 r10:61c88647 r9:85275400 r8:851f86ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:516 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85276000 r8:851f87ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4465 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85276c00 r4:85276c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85276c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85276c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524678c r4:85246400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85276c00 r8:851f88ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 r5:00001000 r4:ee5d1000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r5:00001000 r4:eadb3000 r5:85245b8c r4:85245800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85245b8c r4:851f8980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85273000 r8:851f89ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8980 r8:8027ecf4 r7:eaf61e60 r6:851f8a00 r5:85273000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851f3bc0 INFO: task kworker/1:518:4467 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a87c1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85272400 r5:85272400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85272400 r8:851f8aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851f8b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8b80 r8:8027ecf4 r7:eaf61e60 r6:851f8c00 r5:85270000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851ed980 INFO: task kworker/1:520:4471 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a87c1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:521:4473 blocked for more than 461 seconds. [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8526c800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf71e08 r9:83018205 r8:8526c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 r10:61c88647 r9:8526c800 r8:851f8cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4474 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf31d84 r8:00000002 r7:60000013 r6:eaf31d8c r5:85278000 r4:85278000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85278000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85278000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae67000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85246b8c r4:85246800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85246b8c r4:851f8d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85278000 r8:851f8dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8d80 r8:8027ecf4 r7:eaf71e60 r6:851f8e00 r5:85278000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:523 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85278c00 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4479 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:85279800 r4:85279800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85279800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85279800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf13000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524738c r4:85247000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524738c r4:851f8f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85279800 r8:851f8fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f8f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f8f80 r8:8027ecf4 r7:eaf75e60 r6:8521a000 r5:85279800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852123c0 INFO: task kworker/1:524:4479 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a967f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:525 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:84ab8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r10:61c88647 r9:84ab8000 r8:8521a0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85212640 INFO: task kworker/1:525:4481 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a9da4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ab8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ab8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf95000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85247f8c r4:85247c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85247f8c r4:8521a100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8c00 r8:8521a12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a100 r8:8027ecf4 r7:eaf75e60 r6:85201180 r5:84ab8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85212740 INFO: task kworker/1:526:4483 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: a9da4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:8495af8c r4:8495ac00 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84abbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8524c38c r4:8521a180 r4:00000001 Exception stack(0xeafb5fb0 to 0xeafb5ff8) r4:85212900 Workqueue: events bpf_prog_free_deferred dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:e044ddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:4488 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafc5d84 r8:00000002 r7:60000013 r6:eafc5d8c r5:84aba400 r4:84aba400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84aba400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524c78c r4:8524c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524c78c r4:8521a200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aba400 r8:8521a22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r4:85212980 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r5:00001000 r4:ee5d1000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:84abb000 r5:84abb000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r9:83018205 r8:84abb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 r5:00001000 r4:eafbd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524cb8c r4:8524c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524cb8c r4:8521a300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abb000 r8:8521a32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a300 r8:8027ecf4 r7:eafc5e60 r6:85201300 r5:84abb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85212b00 INFO: task kworker/1:529:4489 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: aacf4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84abc800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r9:83018205 r8:84abc800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 r10:61c88647 r9:84abc800 r8:8521a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:531 state:D stack:0 pid:4493 tgid:4493 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84abd400 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85212c80 INFO: task kworker/1:531:4493 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ab221000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:532:4496 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:532 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafe9d84 r8:00000002 r7:60000013 r6:eafe9d8c r5:8418d400 r5:8418d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8524d78c r4:8524d400 r10:00000000 r9:8521a400 r8:8027ecf4 r7:eafdde60 r6:85201480 r5:8418d400 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4497 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:8429a400 r4:8429a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8429a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8429a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524db8c r4:8524d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524db8c r4:8521a480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8429a400 r8:8521a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a480 r8:8027ecf4 r7:eafe9e60 r6:85201500 r5:8429a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:4498 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84abec00 r5:84abec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf480 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8521a500 r8:8027ecf4 r7:eafede60 r6:85201580 r5:84abec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:848b8c00 r4:848b8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524e38c r4:8524e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524e38c r4:8521a580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:8521a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a580 r8:8027ecf4 r7:eaff1e60 r6:85201600 r5:848b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847bf300 INFO: task kworker/1:535:4501 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: abff6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:848ba400 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e05c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524f38c r4:8524f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524f38c r4:8521a600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ba400 r8:8521a62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a600 r8:8027ecf4 r7:eaffde60 r6:85201680 r5:848ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847bf500 INFO: task kworker/1:536:4503 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: abff6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 r5:848b8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4507 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4507 tgid:4507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb015d84 r8:00000002 r7:60000013 r6:eb015d8c r5:848b9800 r4:848b9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bf880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0515000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524eb8c r4:8524e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524eb8c r4:8521a700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b9800 r8:8521a72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a700 r8:8027ecf4 r7:eb005e60 r6:85201780 r5:848b9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847bf540 INFO: task kworker/1:538:4507 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ac644000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:539 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8527a400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8527a400 r8:8521a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: aca8f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8527bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r5:00001000 r4:e06ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524f78c r4:8524f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524f78c r4:8521a880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527bc00 r8:8521a8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a880 r8:8027ecf4 r7:eb005e60 r6:8521a900 r5:8527bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847bf980 INFO: task kworker/1:540:4511 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ad0c1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:541:4513 blocked for more than 461 seconds. r5:8527c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fff00 r7:ddde2d40 r6:83018200 r5:8525438c r4:8521a980 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 Workqueue: events bpf_prog_free_deferred r5:8527d400 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847bfac0 INFO: task kworker/1:542:4514 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ad0c1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4517 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:8527e000 r4:8527e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bff40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8524ff8c r4:8524fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8524ff8c r4:8521ab80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527e000 r8:8521abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ab80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ab80 r8:8027ecf4 r7:eb019e60 r6:8521ac00 r5:8527e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851ffbc0 INFO: task kworker/1:543:4517 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ad617000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8527ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bfdc0 r7:ddde2d40 r6:83018200 r5:8525478c r4:8521ac80 Exception stack(0xeb029fb0 to 0xeb029ff8) r4:851ffbc0 r4:00000000 dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:4521 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:8527b000 r4:8527b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8527b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479a0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8527b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0813000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85254b8c r4:85254800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85254b8c r4:8521ad80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8527b000 r8:8521adac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ad80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ad80 r8:8027ecf4 r7:eb029e60 r6:8521ae00 r5:8527b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479a000 INFO: task kworker/1:545:4521 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: addc2000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495af8c r4:8495ac00 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85280000 r5:85280000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479a500 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:547 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85280c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479a380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85280c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85254f8c r4:85254c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85254f8c r4:8521af80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280c00 r8:8521afac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521af80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521af80 r8:8027ecf4 r7:eb031e60 r6:847de000 r5:85280c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479a200 INFO: task kworker/1:547:4525 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ae95a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85281800 r5:85281800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479aa40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85281800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa17000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85255f8c r4:85255c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85255f8c r4:847de080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85281800 r8:847de0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de080 r8:8027ecf4 r7:eb031e60 r6:847de100 r5:85281800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479a300 INFO: task kworker/1:548:4527 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:549:4528 blocked for more than 461 seconds. r4:85282400 r5:85282400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85282400 r8:847de1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: ae95a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495af8c r4:8495ac00 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4533 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:85283000 r4:85283000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85283000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479a940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85283000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8979000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85255b8c r4:85255800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85255b8c r4:847de280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283000 r8:847de2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de280 r8:8027ecf4 r7:eb039e60 r6:847de300 r5:85283000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479a980 INFO: task kworker/1:550:4533 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r5:80070013 r4:80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:551:4534 blocked for more than 461 seconds. r5:85284800 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479ac00 r5:00001000 r4:eaa53000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525638c r4:85256000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525638c r4:847de380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85284800 r8:847de3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de380 r8:8027ecf4 r7:eb039e60 r6:847de400 r5:85284800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479a7c0 INFO: task kworker/1:551:4534 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: af5e8000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r5:85285400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479ad80 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb045fb0 to 0xeb045ff8) Workqueue: events bpf_prog_free_deferred dd20: af5e8000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85286000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479af40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85286000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85256b8c r4:85256800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85256b8c r4:847de580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85286000 r8:847de5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de580 r8:8027ecf4 r7:eb045e60 r6:847de600 r5:85286000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8479acc0 INFO: task kworker/1:553:4537 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: af99a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:554:4540 blocked for more than 461 seconds. r5:85286c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737040 r7:ddde2d40 r6:83018200 r5:8525738c r4:847de680 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:4542 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:555 state:D stack:0 pid:4542 tgid:4542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:85283c00 r4:85283c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85283c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8479a440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85283c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85256f8c r4:85256c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85256f8c r4:847de780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85283c00 r8:847de7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de780 r8:8027ecf4 r7:eb04de60 r6:847de800 r5:85283c00 r4:00000001 Exception stack(0xeb051fb0 to 0xeb051ff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:556:4544 blocked for more than 461 seconds. r5:85288000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85288000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525778c r4:85257400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525778c r4:847de880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85288000 r8:847de8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de880 r8:8027ecf4 r7:eb04de60 r6:847de900 r5:85288000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb055fb0 to 0xeb055ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: afe48000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4547 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb059d84 r8:00000002 r7:60000013 r6:eb059d8c r5:85288c00 r4:85288c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85288c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85257b8c r4:85257800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85257b8c r4:847de980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85288c00 r8:847de9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847de980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847de980 r8:8027ecf4 r7:eb055e60 r6:847dea00 r5:85288c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:558:4548 blocked for more than 461 seconds. r5:85289800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:4550 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:8528a400 r4:8528a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511078c r4:85110400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511078c r4:847deb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528a400 r8:847debac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847deb80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:560:4551 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:8528b000 r4:8528b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847377c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead43000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511038c r4:85110000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511038c r4:847dec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528b000 r8:847decac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dec80 r8:8027ecf4 r7:eb061e60 r6:847ded00 r5:8528b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84737480 INFO: task kworker/1:560:4551 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b0c72000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4554 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8528bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8528bc00 r8:847dedac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb065fb0 to 0xeb065ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe044dd20 to 0xe044dd68) r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495af8c r4:8495ac00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb075d84 r8:00000002 r7:60000013 r6:eb075d8c r5:8528c800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85110f8c r4:85110c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85110f8c r4:847dee80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528c800 r8:847deeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dee80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dee80 r8:8027ecf4 r7:eb065e60 r6:847def00 r5:8528c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84737900 INFO: task kworker/1:562:4556 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b11e9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:563:4558 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:8528d400 r5:8528d400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737f80 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb08dd84 r8:00000002 r7:60000013 r6:eb08dd8c r5:8528e000 r4:8528e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8528e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84737d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8528e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511138c r4:85111000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511138c r4:85076080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8528e000 r8:850760ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076080 r8:8027ecf4 r7:eb081e60 r6:85076100 r5:8528e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84737cc0 INFO: task kworker/1:564:4560 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b11e9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:8528ec00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8528ec00 r8:850761ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd20: b11e9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4564 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0a5d84 r8:00000002 r7:60000013 r6:eb0a5d8c r5:85290000 r4:85290000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85290000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ff640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85290000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511238c r4:85112000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8511238c r4:85076280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85290000 r8:850762ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076280 r8:8027ecf4 r7:eb099e60 r6:85076300 r5:85290000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ff080 INFO: task kworker/1:566:4564 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: b16ba000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:8495af8c r4:8495ac00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:85291800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 r5:80070013 r4:80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495af8c r4:8495ac00 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb0d5d84 r8:00000002 r7:60000113 r6:eb0d5d8c r5:85293000 r4:85293000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85293000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8482a740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85293000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ce78c r4:851ce400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851ce78c r4:85201800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293000 r8:8520182c r7:82804d40 r6:dddced40 r5:dddced60 r4:85201800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85201800 r8:8027ecf4 r7:eae99e60 r6:85076480 r5:85293000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8482a400 INFO: task kworker/0:156:4569 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b1a1e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85292400 r5:85292400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ffa00 r7:ddde2d40 r6:83018200 r5:8511278c r4:85076500 Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) r4:850ff580 Call trace: dd20: b1f2f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:4572 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:4572 tgid:4572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:848bb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848bb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c6480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cf78c r4:851cf400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848bb000 r8:852018ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8482a5c0 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r4:848bd400 r5:848bd400 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:851ceb8c r4:851ce800 r10:00000000 r9:85201980 r8:8027ecf4 r7:eb0b1e60 r6:85201a00 r5:848bd400 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8482a5c0 INFO: task kworker/0:158:4573 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b2668000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85290c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfcab000 r10:61c88647 r9:85290c00 r8:8507662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:570 state:D stack:0 pid:4577 tgid:4577 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ffd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85293c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbb3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85112f8c r4:85112c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85112f8c r4:85076700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85293c00 r8:8507672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076700 r8:8027ecf4 r7:eb0f1e60 r6:85201a80 r5:85293c00 r4:00000001 Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) dd20: b2668000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:848be000 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850ffc80 dd20: b2668000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 INFO: task kworker/1:572:4583 blocked for more than 462 seconds. r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85113f8c r4:85113c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85113f8c r4:85076800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bec00 r8:8507682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076800 r8:8027ecf4 r7:eb0fde60 r6:85201b80 r5:848bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850ffe80 INFO: task kworker/1:572:4583 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b2bb1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e044ddc0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 INFO: task kworker/1:573:4585 blocked for more than 462 seconds. r5:84abe000 r4:829189bc r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ff380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84abe000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb111fb0 to 0xeb111ff8) Exception stack(0xe044dd20 to 0xe044dd68) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84789140 r5:84ab9800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:8525c38c r4:85076900 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:00001000 r4:eab45000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cef8c r4:851cec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:851cef8c r4:85201d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bbc00 r8:85201d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85201d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85201d00 r8:8027ecf4 r7:eb0b1e60 r6:85201d80 r5:848bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8482ae00 INFO: task kworker/0:159:4589 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 INFO: task kworker/1:575:4591 blocked for more than 462 seconds. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:8525c78c r4:85076980 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:84ac8000 r4:84ac8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ac8000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525cb8c r4:8525c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85076a00 r8:8027ecf4 r7:eb119e60 r6:85201e80 r5:84ac8000 Exception stack(0xe044dd20 to 0xe044dd68) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:8525cf8c r4:85076a80 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea987000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525d38c r4:8525d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525d38c r4:85076b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac9800 r8:85076b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:8525d78c r4:85076b80 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:580:4601 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:580 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:84acb000 r4:84acb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84acb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:84acb000 r8:85076c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e044ddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:581:4605 blocked for more than 462 seconds. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead51000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525db8c r4:8525d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525db8c r4:85076c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84acc800 r8:85076cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076c80 r8:8027ecf4 r7:eb109e60 r6:85115200 r5:84acc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852c4980 INFO: task kworker/1:581:4605 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000001 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b4459000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:847a6d80 Not tainted 6.15.0-syzkaller #0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000001 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b479d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 Exception stack(0xe044dfb0 to 0xe044dff8) task:kworker/0:163 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xeb13dfb0 to 0xeb13dff8) dd20: b4962000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:84a50000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84a50000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525e38c r4:8525e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525e38c r4:85076d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a50000 r8:85076d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076d00 r8:8027ecf4 r7:eb109e60 r6:85115580 r5:84a50000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:84789140 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b4cd6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe044dfb0 to 0xe044dff8) r4:84a51800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:8498f78c r4:85076e00 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:84a54800 r4:00000000 r5:00001000 r4:eade7000 Exception stack(0xeb161fb0 to 0xeb161ff8) Exception stack(0xe044dd20 to 0xe044dd68) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84789140 r5:84a53000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8525ef8c r4:8525ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8525ef8c r4:85076f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a53000 r8:85076f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85076f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85076f00 r8:8027ecf4 r7:eb159e60 r6:85115880 r5:84a53000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8503a040 INFO: task kworker/1:586:4623 is blocked on a mutex likely owned by task kworker/1:209:3661. r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r5:00001000 r4:ee5d1000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:84a56000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4627 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb175d84 r8:00000002 r7:60000013 r6:eb175d8c r5:84a55400 r4:84a55400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:00001000 r4:eaf15000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4631 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:84a53c00 r4:84a53c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a53c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dd60: 80070013 ffffffff r5:8495af8c r4:8495ac00 Not tainted 6.15.0-syzkaller #0 r4:00000000 r7:dddced40 r6:83018000 r5:8498f38c r4:85115b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852c8040 INFO: task kworker/0:165:4633 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b6430000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r4:e044ddc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) Exception stack(0xeb185fb0 to 0xeb185ff8) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) Exception stack(0xe044dfb0 to 0xe044dff8) r10:829189c0 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:84ad1800 r9:83018205 r8:84ad1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b68ad000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e044ddc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4648 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:84ad4800 r4:84ad4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:dddced40 r6:83018000 r5:8533478c r4:85115f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad6000 r8:85115f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85115f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115f00 r8:8027ecf4 r7:eb139e60 r6:85115f80 r5:84ad6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852c8cc0 INFO: task kworker/0:167:4649 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r5:00001000 r4:ee5d1000 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84ad6c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8503ac00 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:84aa0000 r8:8504342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b7298000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:84aa1800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:e044ddc0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Not tainted 6.15.0-syzkaller #0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:00001000 r4:e073d000 r4:00000001 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:dddced40 r6:83018000 r5:85335f8c r4:852ce400 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:ddde2d40 r6:83018200 r5:85336b8c r4:85043480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r7:dddced40 r6:83018000 r5:85335b8c r4:852ce580 r4:852cf540 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) Not tainted 6.15.0-syzkaller #0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:8533638c r4:85336000 Exception stack(0xeb171fb0 to 0xeb171ff8) r4:00000000 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:8533678c r4:85336400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:4668 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:84aa2400 r4:84aa2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84aa2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cfe00 r4:852ce880 r4:852cf940 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r5:8495af8c r4:8495ac00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:85299b8c r4:85299800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ad3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa19000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533738c r4:85337000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8533738c r4:852cea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad3c00 r8:852ceaac r7:82804d40 r6:dddced40 r5:dddced60 r4:852cea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cea80 r8:8027ecf4 r7:eb1a9e60 r6:852ceb00 r5:84ad3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852cfc00 INFO: task kworker/0:176:4672 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) r4:84789140 task:kworker/0:177 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:852cec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cec00 r8:8027ecf4 r7:eb1bde60 r6:85043600 r5:85296000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c5fb0 to 0xeb1c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850fc000 INFO: task kworker/0:178:4676 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b9561000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r5:85295400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r7:dddced40 r6:83018000 r5:85337f8c r4:852cec80 Workqueue: events bpf_prog_free_deferred r4:e044ddc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: b9561000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Workqueue: events bpf_prog_free_deferred r5:85368000 r4:829189bc r4:00000000 r10:61c88647 r9:85368000 r8:852cedac r7:82804d40 r6:dddced40 r5:dddced60 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:847a6d80 Not tainted 6.15.0-syzkaller #0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8529978c r4:85299400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8529978c r4:85043800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85368c00 r8:8504382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85043800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85043800 r8:8027ecf4 r7:eb1ade60 r6:85043880 r5:85368c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504a400 INFO: task kworker/1:599:4683 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:8495af8c r4:8495ac00 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Workqueue: events bpf_prog_free_deferred r5:8536a400 r4:829189bc r4:00000000 r7:dddced40 r6:83018000 r5:85340f8c r4:852cee00 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84789140 r5:8536b000 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bb0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8536bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85299f8c r4:85299c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85299f8c r4:85043a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536bc00 r8:85043a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85043a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85043a00 r8:8027ecf4 r7:eb1ade60 r6:85043a80 r5:8536bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504a880 INFO: task kworker/1:600:4691 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ba59a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r5:80070013 r4:80239bb0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:601:4693 blocked for more than 462 seconds. r5:8536c800 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504acc0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850688c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8536d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb239000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:847a6d80 r4:84789140 r5:8536e000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeb1e5fb0 to 0xeb1e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8504aac0 INFO: task kworker/1:603:4696 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bb904000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:84789140 r5:8536ec00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:61c88647 r9:8536ec00 r8:852cef2c r7:82804d40 r6:dddced40 r5:dddced60 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: bb904000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 INFO: task kworker/0:185:4700 blocked for more than 463 seconds. r5:85369800 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:847a6d80 INFO: task kworker/0:186:4701 blocked for more than 463 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r10:61c88647 r9:852f8000 r8:852ce9ac r7:82804d40 r6:dddced40 r5:dddced60 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:604 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:e044ddc0 r5:8495af8c r4:8495ac00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:4706 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:852f9800 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:852cd000 r8:8027ecf4 r7:eb1ede60 r6:852c9080 r5:852f9800 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 r5:852fb000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb1f1d84 r8:00000002 r7:60000013 r6:eb1f1d8c r5:85371800 r4:85371800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85371800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 INFO: task kworker/0:190:4713 blocked for more than 463 seconds. r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:847a6d80 INFO: task kworker/0:191:4714 blocked for more than 463 seconds. r5:85373c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85373c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb217000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534338c r4:85343000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534338c r4:852cd300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85373c00 r8:852cd32c r7:82804d40 r6:dddced40 r5:dddced60 r4:852cd300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cd300 r8:8027ecf4 r7:eb1f1e60 r6:852cd380 r5:85373c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:191:4714 is blocked on a mutex likely owned by task kworker/1:209:3661. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 dfa0: 00000000 00000000 00000000 00000000 r5:85375400 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb580 Exception stack(0xeb229fb0 to 0xeb229ff8) Exception stack(0xe044dd20 to 0xe044dd68) r5:00001000 r4:ee5d1000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:4718 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb22dd84 r8:00000002 r7:60000113 r6:eb22dd8c r5:85376000 r4:85376000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85376000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e044ddc0 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 r5:85372400 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb2c0 r10:00000000 r9:852c9180 r8:8027ecf4 r7:eb1dde60 r6:852cd600 r5:85372400 Exception stack(0xe044dd20 to 0xe044dd68) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:4722 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:85374800 r4:85374800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85374800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 r4:00000000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:852c9200 r4:85068800 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:195 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb24dd84 r8:00000002 r7:60000113 r6:eb24dd8c r5:85370000 r4:85370000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85370000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb24de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cbf80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85370000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534878c r4:85348400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534878c r4:852cd800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85370000 r8:852cd82c r7:82804d40 r6:dddced40 r5:dddced60 r4:852cd800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cd800 r8:8027ecf4 r7:eb22de60 r6:852cd880 r5:85370000 Exception stack(0xeb24dfb0 to 0xeb24dff8) dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85376c00 r4:829189bc [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503a800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85380000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb27f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85348b8c r4:85348800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85348b8c r4:852cda00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85380000 r8:852cda2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852cda00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cda00 r8:8027ecf4 r7:eb24de60 r6:852cda80 r5:85380000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85380c00 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e044ddc0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 INFO: task kworker/0:199:4734 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb289d84 r8:00000002 r7:60000113 r6:eb289d8c r5:85381800 r4:85381800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85381800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb289e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85381800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb297000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb289fb0 to 0xeb289ff8) dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:84789140 r4:85382400 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85349b8c r4:85349800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85349b8c r4:852cde00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85383000 r8:852cde2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852cde00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cde00 r8:8027ecf4 r7:eb295e60 r6:852cde80 r5:85383000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023300 INFO: task kworker/0:201:4738 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0034000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:4740 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2b5d84 r8:00000002 r7:60000013 r6:eb2b5d8c r5:85383c00 r4:85383c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85383c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85023800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85383c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85349f8c r4:85349c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85349f8c r4:852cdf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85383c00 r8:852cdf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852cdf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852cdf00 r8:8027ecf4 r7:eb2a1e60 r6:852cdf80 r5:85383c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850234c0 INFO: task kworker/0:202:4740 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0034000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:00001000 r4:ee5d1000 r5:8495af8c r4:8495ac00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:203 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85384800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534a78c r4:84775000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85384800 r8:8477502c r7:82804d40 r6:dddced40 r5:dddced60 r4:84775000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84775000 r8:8027ecf4 r7:eb2b5e60 r6:84775080 r5:85384800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:850237c0 INFO: task kworker/0:203:4744 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c07f2000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:204 state:D stack:0 pid:4745 tgid:4745 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85385400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8534a38c r4:84775100 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:205 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534af8c r4:84775200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85386000 r8:8477522c r7:82804d40 r6:dddced40 r5:dddced60 r4:84775200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84775200 r8:8027ecf4 r7:eb2c5e60 r6:84775280 r5:85386000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb301fb0 to 0xeb301ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023b40 INFO: task kworker/0:205:4746 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c0dd4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85386c00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb31f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534b38c r4:8534b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534b38c r4:84775400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e0000 r8:8477542c r7:82804d40 r6:dddced40 r5:dddced60 r4:84775400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84775400 r8:8027ecf4 r7:eb301e60 r6:84775480 r5:848e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023c40 INFO: task kworker/0:207:4750 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c1601000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:848e0c00 r5:848e0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb31dfb0 to 0xeb31dff8) INFO: task kworker/0:208:4753 is blocked on a mutex likely owned by task kworker/1:209:3661. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb329d84 r8:00000002 r7:60000113 r6:eb329d8c r5:848e1800 r4:848e1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852cb2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8534b78c r4:8534b400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8534b78c r4:84775600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e1800 r8:8477562c r7:82804d40 r6:dddced40 r5:dddced60 r4:84775600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84775600 r8:8027ecf4 r7:eb31de60 r6:84775680 r5:848e1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85023f40 INFO: task kworker/0:209:4754 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848e3000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8534bb8c r4:8534b800 r4:84775700 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b7100 INFO: task kworker/0:210:4756 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c1e03000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:848e2400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8534bf8c r4:84775800 r10:00000000 r9:84775800 r8:8027ecf4 r7:eb31de60 r6:84775880 r5:848e2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b7280 INFO: task kworker/0:211:4758 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c28cc000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:212 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848e5400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b77c0 r7:dddced40 r6:83018000 r5:8535478c r4:84775900 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:848e6000 r4:829189bc r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b7c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85354b8c r4:85354800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85354b8c r4:84775a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e6000 r8:84775a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84775a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84775a00 r8:8027ecf4 r7:eb361e60 r6:84775a80 r5:848e6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb36dfb0 to 0xeb36dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b7640 INFO: task kworker/0:213:4762 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:607 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848e6c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cb540 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:608:4768 blocked for more than 463 seconds. r5:852fbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8529bf8c r4:852c9300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852fbc00 r8:852c932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852c9300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c9300 r8:8027ecf4 r7:eb381e60 r6:852c9380 r5:852fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847cb140 INFO: task kworker/1:608:4768 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:852fe000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r5:852a478c r4:852a4400 r10:00000000 r9:852c9400 r8:8027ecf4 r7:eb381e60 r6:852c9480 r5:852fe000 Call trace: r4:e044ddc0 r5:8495af8c r4:8495ac00 Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:dff41000 r4:00000001 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c3a0e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:852fec00 r4:829189bc r4:00000000 r7:ddde2d40 r6:83018200 r5:852a4b8c r4:852c9600 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r10:61c88647 r9:852fd400 r8:852c972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:4779 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:852fa400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847cb800 Exception stack(0xe044dd20 to 0xe044dd68) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85300000 r5:85300000 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85068a80 r7:ddde2d40 r6:83018200 r5:852a5f8c r4:852c9900 Exception stack(0xeb39dfb0 to 0xeb39dff8) INFO: task kworker/1:614:4781 is blocked on a mutex likely owned by task kworker/1:209:3661. dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 r5:8495af8c r4:8495ac00 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:4782 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:4782 tgid:4782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:85300c00 r4:85300c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85300c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cbc80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85300c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a578c r4:852a5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a578c r4:852c9a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85300c00 r8:852c9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852c9a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c9a00 r8:8027ecf4 r7:eb39de60 r6:852c9a80 r5:85300c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847cbb80 INFO: task kworker/1:615:4782 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c4528000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ee5d1000 Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r5:85301800 r4:829189bc r9:83018005 r8:85301800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:ee5d1000 Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473d680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85302400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a5b8c r4:852a5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a5b8c r4:852c9b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85302400 r8:852c9bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852c9b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c9b80 r8:8027ecf4 r7:eb39de60 r6:852c9c00 r5:85302400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473d4c0 INFO: task kworker/1:616:4786 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r5:80070013 r4:80239bb0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85303000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:85303c00 r4:85303c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85303c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d0500 Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) r4:00000000 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 r5:85304800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852a678c r4:852a6400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852a678c r4:852c9d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85304800 r8:852c9dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852c9d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c9d80 r8:8027ecf4 r7:eb3b1e60 r6:852c9f00 r5:85304800 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8495af8c r4:8495ac00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:4795 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3b9d84 r8:00000002 r7:60000013 r6:eb3b9d8c r5:85305400 r4:85305400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85305400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:852d0380 Exception stack(0xe044dd20 to 0xe044dd68) r4:00000000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85306000 r4:829189bc r9:83018205 r8:85306000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 dfa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85306c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r5:8535738c r4:85357000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8535738c r4:84775c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85306c00 r8:84775c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84775c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84775c00 r8:8027ecf4 r7:eb3a9e60 r6:852d6200 r5:85306c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d8300 INFO: task kworker/0:215:4798 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c662d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:e044ddc0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85308000 r4:829189bc [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:847a6d80 r4:84789140 r5:85308c00 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 r4:852d0680 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c6deb000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85309800 r4:829189bc r4:00000000 r10:61c88647 r9:85309800 r8:852d642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8530a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cbfc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530a400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf23000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b478c r4:852b4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b478c r4:852d6500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530a400 r8:852d652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) r4:00000000 r4:e044ddc0 r5:8495af8c r4:8495ac00 dfa0: 00000000 00000000 00000000 00000000 r5:8530b000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r7:ddde2d40 r6:83018200 r5:852b438c r4:852d6600 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r5:8495af8c r4:8495ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8530bc00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8530bc00 r8:852d672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c7c00000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:628:4811 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:628 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:8530c800 r4:8530c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530c800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:852b538c r4:852d6800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e8240 INFO: task kworker/1:628:4811 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c7c00000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e044ddc0 r4:00000000 r5:8495af8c r4:8495ac00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84789140 task:kworker/1:629 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8530d400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8530d400 r8:852d692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r5:8495af8c r4:8495ac00 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:630 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb3e9d84 r8:00000002 r7:60000113 r6:eb3e9d8c r5:8530e000 r4:8530e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8530e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b578c r4:852b5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b578c r4:852d6a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530e000 r8:852d6a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852d6a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6a00 r8:8027ecf4 r7:eb3e1e60 r6:852d6a80 r5:8530e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e83c0 INFO: task kworker/1:630:4815 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c86f1000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8530ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8530ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb169000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b638c r4:852b6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b638c r4:852d6b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8530ec00 r8:852d6b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852d6b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852d6b00 r8:8027ecf4 r7:eb3e9e60 r6:852d6b80 r5:8530ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e8440 INFO: task kworker/1:631:4817 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c91d8000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85310c00 r4:829189bc r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe044dd20 to 0xe044dd68) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:633:4820 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:633 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) r5:80070013 r4:80239bb0 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:85312400 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:00000001 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb415d84 r8:00000002 r7:60000113 r6:eb415d8c r5:84a8a400 r4:84a8a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a8a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb401000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852b678c r4:852b6400 r4:852e8c80 r4:82ac11e4 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r10:829189c0 r9:eb419d84 r8:00000002 r7:60000113 r6:eb419d8c r5:84a89800 r5:852b6b8c r4:852b6800 INFO: task kworker/1:636:4826 is blocked on a mutex likely owned by task kworker/1:209:3661. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: c98c9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:852f4000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84a8b000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8fc0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:ee5d1000 Exception stack(0xe044dfb0 to 0xe044dff8) r10:829189c0 r9:eb469d84 r8:00000002 r7:60000013 r6:eb469d8c r5:84a8e000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a02c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb461000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852b7b8c r4:852b7800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852b7b8c r4:852f4100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8e000 r8:852f412c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4100 r8:8027ecf4 r7:eb3f1e60 r6:84775f00 r5:84a8e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:639:4833 is blocked on a mutex likely owned by task kworker/1:209:3661. r4:00000000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r5:84a88c00 r4:829189bc r4:00000000 r10:61c88647 r9:84a88c00 r8:852f41ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84a8c800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:642:4839 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:642 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84a88000 r4:829189bc [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851a03c0 dd60: 80070013 ffffffff [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84789140 r5:84a8d400 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) Exception stack(0xe044dd20 to 0xe044dd68) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:4843 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:848e3c00 r4:848e3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a0840 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:4844 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:848e4800 r4:848e4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848e4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a0580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ff000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb501000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bdb8c r4:852bd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bdb8c r4:852f4400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e4800 r8:852f442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4400 r8:8027ecf4 r7:eb4a5e60 r6:85202200 r5:848e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a06c0 INFO: task kworker/1:645:4844 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cb498000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:4846 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb405d84 r8:00000002 r7:60000013 r6:eb405d8c r5:85314800 r4:85314800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85314800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a0bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85314800 r7:00000000 r6:83018200 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bd38c r4:852bd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bd38c r4:852f4480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85314800 r8:852f44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4480 r8:8027ecf4 r7:eb4c1e60 r6:852f4500 r5:85314800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a06c0 INFO: task kworker/1:646:4846 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cb498000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:4849 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:85316000 r4:85316000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85316000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85316000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8535578c r4:85355400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8535578c r4:85202280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316000 r8:852022ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85202280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85202280 r8:8027ecf4 r7:eb3c1e60 r6:852f4600 r5:85316000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85203240 INFO: task kworker/0:216:4849 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cb9b4000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:4850 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:85316c00 r4:85316c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85316c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d8a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85316c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bd78c r4:852bd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bd78c r4:852f4580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85316c00 r8:852f45ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4580 r8:8027ecf4 r7:eb4c1e60 r6:852f4680 r5:85316c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a0a40 INFO: task kworker/1:647:4850 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cbd47000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:4852 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:85313000 r4:85313000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85313000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85313000 r7:00000000 r6:83018000 r5:00001000 r4:7f0fb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85355b8c r4:85355800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85355b8c r4:85202300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313000 r8:8520232c r7:82804d40 r6:dddced40 r5:dddced60 r4:85202300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85202300 r8:8027ecf4 r7:eb3c1e60 r6:852f4700 r5:85313000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85203380 INFO: task kworker/0:217:4852 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc00f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4854 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:85315400 r4:85315400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85315400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85315400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb219000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f978c r4:853f9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853f978c r4:85202380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85315400 r8:852023ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85202380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85202380 r8:8027ecf4 r7:eb3c1e60 r6:852f4780 r5:85315400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852034c0 INFO: task kworker/0:218:4854 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc00f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:4857 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4f5d84 r8:00000002 r7:60000013 r6:eb4f5d8c r5:85310000 r4:85310000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85310000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85310000 r7:00000000 r6:83018200 r5:00001000 r4:7f101000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb509000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bdf8c r4:852bdc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bdf8c r4:852f4800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85310000 r8:852f482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4800 r8:8027ecf4 r7:eb4c1e60 r6:852f4880 r5:85310000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851a0b00 INFO: task kworker/1:648:4857 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc4a3000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:4859 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:85313c00 r4:85313c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85313c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85313c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852beb8c r4:852be800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852beb8c r4:852f4900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85313c00 r8:852f492c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4900 r8:8027ecf4 r7:eb4f5e60 r6:852f4980 r5:85313c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206000 INFO: task kworker/1:649:4859 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc74d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:4861 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:84a8ec00 r4:84a8ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a8ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852060c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f103000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb511000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852be38c r4:852be000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852be38c r4:852f4a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8ec00 r8:852f4a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4a00 r8:8027ecf4 r7:eb7e1e60 r6:852f4a80 r5:84a8ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206180 INFO: task kworker/1:650:4861 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cc74d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:4863 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:85318000 r4:85318000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85318000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852063c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85318000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852be78c r4:852be400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852be78c r4:852f4b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318000 r8:852f4b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4b00 r8:8027ecf4 r7:eb7e1e60 r6:852f4b80 r5:85318000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206240 INFO: task kworker/1:651:4863 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ccc8b000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:4866 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:85318c00 r4:85318c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85318c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852067c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85318c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bf38c r4:852bf000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bf38c r4:852f4c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85318c00 r8:852f4c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4c00 r8:8027ecf4 r7:eb7e1e60 r6:852f4c80 r5:85318c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206380 INFO: task kworker/1:652:4866 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ccc8b000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:653:4867 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:653 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb21dd84 r8:00000002 r7:60000013 r6:eb21dd8c r5:85319800 r4:85319800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85319800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85319800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bef8c r4:852bec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bef8c r4:852f4d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85319800 r8:852f4d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4d00 r8:8027ecf4 r7:eacf9e60 r6:852f4d80 r5:85319800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852064c0 INFO: task kworker/1:653:4867 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cd660000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:4870 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb225d84 r8:00000002 r7:60000113 r6:eb225d8c r5:8531a400 r4:8531a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0503000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bf78c r4:852bf400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bf78c r4:852f4e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531a400 r8:852f4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4e00 r8:8027ecf4 r7:eacf9e60 r6:852f4e80 r5:8531a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206880 INFO: task kworker/1:654:4870 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cd660000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:4871 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:4871 tgid:4871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb23dd84 r8:00000002 r7:60000113 r6:eb23dd8c r5:8531b000 r4:8531b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bfb8c r4:852bf800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bfb8c r4:852f4f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531b000 r8:852f4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f4f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f4f00 r8:8027ecf4 r7:eb225e60 r6:852f4f80 r5:8531b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206740 INFO: task kworker/1:655:4871 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cd7f9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:656:4874 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:656 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb26dd84 r8:00000002 r7:60000113 r6:eb26dd8c r5:8531bc00 r4:8531bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0701000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852bff8c r4:852bfc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852bff8c r4:83c20380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531bc00 r8:83c203ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83c20380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c20380 r8:8027ecf4 r7:eb23de60 r6:8503d000 r5:8531bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206980 INFO: task kworker/1:656:4874 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cdc22000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:4875 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb285d84 r8:00000002 r7:60000113 r6:eb285d8c r5:8531c800 r4:8531c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531c800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0753000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ec38c r4:853ec000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ec38c r4:8503d080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531c800 r8:8503d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d080 r8:8027ecf4 r7:eb26de60 r6:8503d100 r5:8531c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206ac0 INFO: task kworker/1:657:4875 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ce185000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:658:4876 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:658 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:8531d400 r4:8531d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ed78c r4:853ed400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ed78c r4:8503d180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531d400 r8:8503d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d180 r8:8027ecf4 r7:eb285e60 r6:8503d200 r5:8531d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206ac0 INFO: task kworker/1:658:4876 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ce185000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:659:4878 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb29dd84 r8:00000002 r7:60000013 r6:eb29dd8c r5:8531ec00 r4:8531ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8531ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8531ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0831000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ec78c r4:853ec400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ec78c r4:8503d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8531ec00 r8:8503d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d280 r8:8027ecf4 r7:eb491e60 r6:8503d300 r5:8531ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85206e80 INFO: task kworker/1:659:4878 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ce728000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:4882 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:4882 tgid:4882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:85320c00 r4:85320c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85320c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a6000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ecb8c r4:853ec800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ecb8c r4:8503d380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320c00 r8:8503d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d380 r8:8027ecf4 r7:eb491e60 r6:8503d400 r5:85320c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2fdfb0 to 0xeb2fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f040 INFO: task kworker/1:660:4882 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ce728000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:4883 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb291d84 r8:00000002 r7:60000013 r6:eb291d8c r5:84890000 r4:84890000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84890000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84890000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8917000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ecf8c r4:853ecc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ecf8c r4:8503d480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84890000 r8:8503d4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d480 r8:8027ecf4 r7:eb491e60 r6:85202400 r5:84890000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb291fb0 to 0xeb291ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f340 INFO: task kworker/1:661:4883 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cee73000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:662:4886 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:662 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb319d84 r8:00000002 r7:60000113 r6:eb319d8c r5:84890c00 r4:84890c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84890c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84890c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa01000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ed38c r4:853ed000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ed38c r4:8503d500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84890c00 r8:8503d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d500 r8:8027ecf4 r7:eb491e60 r6:85202480 r5:84890c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f440 INFO: task kworker/1:662:4886 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cf675000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:4888 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:4888 tgid:4888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb325d84 r8:00000002 r7:60000013 r6:eb325d8c r5:84892400 r4:84892400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84892400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501f940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84892400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac49000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853edb8c r4:853ed800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853edb8c r4:8503d580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84892400 r8:8503d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d580 r8:8027ecf4 r7:eb491e60 r6:85202500 r5:84892400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f680 INFO: task kworker/1:663:4888 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cf675000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:4890 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:664 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:84893000 r4:84893000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84893000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fd00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84893000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead41000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ee78c r4:853ee400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ee78c r4:8503d600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893000 r8:8503d62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d600 r8:8027ecf4 r7:eb325e60 r6:85202580 r5:84893000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f7c0 INFO: task kworker/1:664:4890 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cfb60000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:4892 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb33dd84 r8:00000002 r7:60000013 r6:eb33dd8c r5:84893c00 r4:84893c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84893c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84893c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853edf8c r4:853edc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853edf8c r4:8503d680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893c00 r8:8503d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d680 r8:8027ecf4 r7:eb331e60 r6:85202600 r5:84893c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f900 INFO: task kworker/1:665:4892 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: cfb60000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:4893 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:84894800 r4:84894800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84894800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84894800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ee38c r4:853ee000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ee38c r4:8503d700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84894800 r8:8503d72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d700 r8:8027ecf4 r7:eb331e60 r6:85202680 r5:84894800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501f740 INFO: task kworker/1:666:4893 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d00a6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:4897 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:84895400 r4:84895400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84895400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ff80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84895400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eef8c r4:853eec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eef8c r4:8503d780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84895400 r8:8503d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d780 r8:8027ecf4 r7:eb331e60 r6:85202700 r5:84895400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501fe80 INFO: task kworker/1:667:4897 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d06ff000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:4898 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb2a9d84 r8:00000002 r7:60000113 r6:eb2a9d8c r5:85320000 r4:85320000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85320000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501fe00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85320000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eeb8c r4:853ee800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eeb8c r4:8503d800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85320000 r8:8503d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d800 r8:8027ecf4 r7:eb525e60 r6:8503d880 r5:85320000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501fe80 INFO: task kworker/1:668:4898 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d06ff000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:4901 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb369d84 r8:00000002 r7:60000113 r6:eb369d8c r5:85322400 r4:85322400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85322400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85322400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ef38c r4:853ef000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ef38c r4:8503d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85322400 r8:8503d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503d900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503d900 r8:8027ecf4 r7:eb525e60 r6:8503d980 r5:85322400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85203000 INFO: task kworker/1:669:4901 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d06ff000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:4902 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:85323000 r4:85323000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85323000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8476d680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85323000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ef78c r4:853ef400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ef78c r4:8503da00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323000 r8:8503da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503da00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503da00 r8:8027ecf4 r7:eb369e60 r6:8503da80 r5:85323000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85203000 INFO: task kworker/1:670:4902 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d0b40000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:671:4904 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:671 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb52dd84 r8:00000002 r7:60000013 r6:eb52dd8c r5:85324800 r4:85324800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85324800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399200 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85324800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb083000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853efb8c r4:853ef800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853efb8c r4:8503db00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85324800 r8:8503db2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503db00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503db00 r8:8027ecf4 r7:eb309e60 r6:8503db80 r5:85324800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85203000 INFO: task kworker/1:671:4904 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d102a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:672:4906 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:672 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:85326000 r4:85326000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85326000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853995c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85326000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f838c r4:853f8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f838c r4:8503dc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85326000 r8:8503dc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503dc00 r8:8027ecf4 r7:eb52de60 r6:8503dc80 r5:85326000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399080 INFO: task kworker/1:672:4906 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d15cb000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:4907 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:84891800 r4:84891800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84891800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84891800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853eff8c r4:853efc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853eff8c r4:8503dd00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84891800 r8:8503dd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503dd00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503dd00 r8:8027ecf4 r7:eb531e60 r6:85202780 r5:84891800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399080 INFO: task kworker/1:673:4907 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d15cb000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:674:4910 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:674 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb541d84 r8:00000002 r7:60000113 r6:eb541d8c r5:84896c00 r4:84896c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84896c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84896c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f878c r4:853f8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f878c r4:8503dd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896c00 r8:8503ddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503dd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503dd80 r8:8027ecf4 r7:eb531e60 r6:85202800 r5:84896c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399440 INFO: task kworker/1:674:4910 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d15cb000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:675:4913 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:675 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb54dd84 r8:00000002 r7:60000113 r6:eb54dd8c r5:84868c00 r4:84868c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84868c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84868c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f8b8c r4:853f8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f8b8c r4:8503de00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868c00 r8:8503de2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503de00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503de00 r8:8027ecf4 r7:eb541e60 r6:85202880 r5:84868c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399580 INFO: task kworker/1:675:4913 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d1de0000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:4914 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:84869800 r4:84869800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84869800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84869800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f8f8c r4:853f8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f8f8c r4:8503de80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84869800 r8:8503deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503de80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503de80 r8:8027ecf4 r7:eb54de60 r6:85202900 r5:84869800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399580 INFO: task kworker/1:676:4914 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d1de0000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:4916 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:8486b000 r4:8486b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486b000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb257000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f9f8c r4:853f9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f9f8c r4:8503df00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486b000 r8:8503df2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503df00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503df00 r8:8027ecf4 r7:eb551e60 r6:85202980 r5:8486b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853997c0 INFO: task kworker/1:677:4916 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2a13000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:4917 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb55dd84 r8:00000002 r7:60000013 r6:eb55dd8c r5:84868000 r4:84868000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84868000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84868000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb209000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f938c r4:853f9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f938c r4:8503df80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868000 r8:8503dfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8503df80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8503df80 r8:8027ecf4 r7:eb559e60 r6:85202a00 r5:84868000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853997c0 INFO: task kworker/1:678:4917 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2a13000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:4920 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:8486bc00 r4:8486bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853f9b8c r4:853f9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853f9b8c r4:853ad000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486bc00 r8:853ad02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ad000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad000 r8:8027ecf4 r7:eb559e60 r6:85202a80 r5:8486bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853997c0 INFO: task kworker/1:679:4920 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d2ceb000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:4921 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:8486c800 r4:8486c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8486c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fb38c r4:853fb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853fb38c r4:85202b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:85202b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85202b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85202b00 r8:8027ecf4 r7:eb3c1e60 r6:85202b80 r5:8486c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539da00 INFO: task kworker/0:219:4921 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d316e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:4924 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:8486d400 r4:8486d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb281000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fa78c r4:853fa400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fa78c r4:853ad080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486d400 r8:853ad0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ad080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad080 r8:8027ecf4 r7:eb559e60 r6:85202c00 r5:8486d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399d00 INFO: task kworker/1:680:4924 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d387e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:4925 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb555d84 r8:00000002 r7:60000013 r6:eb555d8c r5:85323c00 r4:85323c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85323c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85399b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85323c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb263000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fa38c r4:853fa000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fa38c r4:853ad100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323c00 r8:853ad12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ad100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad100 r8:8027ecf4 r7:eb56de60 r6:853ad180 r5:85323c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399d00 INFO: task kworker/1:681:4925 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d387e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:4928 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb569d84 r8:00000002 r7:60000013 r6:eb569d8c r5:85326c00 r4:85326c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85326c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:853ad200 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 r4:84789140 r5:85325400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85325400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fbb8c r4:853fb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fbb8c r4:853ad300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85325400 r8:853ad32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ad300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad300 r8:8027ecf4 r7:eb569e60 r6:853ad380 r5:85325400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb575fb0 to 0xeb575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853ac1c0 INFO: task kworker/1:683:4929 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d42db000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 r4:e044ddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe044dfb0 to 0xe044dff8) Workqueue: events bpf_prog_free_deferred r5:85321800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8531e000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ac7c0 r4:853ad500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad500 r8:8027ecf4 r7:eb575e60 r6:853ad580 r5:8531e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853ac540 INFO: task kworker/1:685:4933 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d48df000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:4936 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8486a400 r5:8486a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471680 r10:61c88647 r9:8486a400 r8:85202cac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80070013 ffffffff r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8486e000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r10:61c88647 r9:8486e000 r8:853ad62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:4940 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb459d84 r8:00000002 r7:60000013 r6:eb459d8c r5:84896000 r4:84896000 r5:84896000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:853fd78c r4:853ad680 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:688:4941 blocked for more than 465 seconds. Call trace: r5:84a40000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:853ad700 r8:8027ecf4 r7:eb459e60 r6:85202e80 r5:84a40000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:4943 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb4b1d84 r8:00000002 r7:60000013 r6:eb4b1d8c r5:84a41800 r4:84a41800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a41800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853accc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a41800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff63000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fc78c r4:853fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fc78c r4:853ad780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a41800 r8:853ad7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ad780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad780 r8:8027ecf4 r7:eb459e60 r6:85202f00 r5:84a41800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 task:kworker/1:690 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85328000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853acdc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85328000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fcb8c r4:853fc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fcb8c r4:853ad800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85328000 r8:853ad82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ad800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ad800 r8:8027ecf4 r7:eb459e60 r6:853ad880 r5:85328000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853acd00 INFO: task kworker/1:690:4945 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d58ab000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85328c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:853ad900 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r5:85329800 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:853fd38c r4:853ada00 r10:61c88647 r9:85329800 r8:853ada2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853ada00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ada00 r8:8027ecf4 r7:eb459e60 r6:853ada80 r5:85329800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85399a00 INFO: task kworker/1:692:4950 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d5f8c000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:693:4952 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:693 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb591d84 r8:00000002 r7:60000013 r6:eb591d8c r5:8532b000 r4:8532b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854774c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8532b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853fdf8c r4:853fdc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8532a400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:853adc00 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: d600a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:4957 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:8532d400 r4:8532d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854777c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8532d400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fe38c r4:853fe000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fe38c r4:853add00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532d400 r8:853add2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853add00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853add00 r8:8027ecf4 r7:eb591e60 r6:853add80 r5:8532d400 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a40c00 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85202f80 r8:8027ecf4 r7:eb3c1e60 r6:843a2080 r5:84a40c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854716c0 INFO: task kworker/0:221:4960 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d649b000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:696:4961 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:696 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:84a43000 r4:84a43000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a43000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb59dfb0 to 0xeb59dff8) [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 r5:8495af8c r4:8495ac00 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a43c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548a3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a43c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85356f8c r4:85356c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85356f8c r4:85479080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a43c00 r8:854790ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85479080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb599fb0 to 0xeb599ff8) INFO: task kworker/0:222:4963 is blocked on a mutex likely owned by task kworker/1:209:3661. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:84a44800 r5:84a44800 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:853ade80 r8:8027ecf4 r7:eb59de60 r6:85479180 r5:84a44800 INFO: task kworker/1:697:4965 is blocked on a mutex likely owned by task kworker/1:209:3661. r4:82ac11e4 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:4968 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:84a46c00 r4:84a46c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a46c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853fef8c r4:853fec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853fef8c r4:853adf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a46c00 r8:853adf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853adf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853adf00 r8:8027ecf4 r7:eb5a9e60 r6:85479200 r5:84a46c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85477880 INFO: task kworker/1:698:4968 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a45400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84a45400 r8:853adfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:4971 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:84a46000 r4:84a46000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a46000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a46000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf91000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ff38c r4:853ff000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ff38c r4:85472080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a46000 r8:854720ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472080 r8:8027ecf4 r7:eb5b9e60 r6:85479300 r5:84a46000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd20: d722f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:701:4972 blocked for more than 465 seconds. r5:838a6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ff78c r4:853ff400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853ff78c r4:85472000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838a6000 r8:8547202c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472000 r8:8027ecf4 r7:eb5b9e60 r6:85479380 r5:838a6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85477cc0 INFO: task kworker/1:701:4972 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d751e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:702 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a42400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477ec0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:4976 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:853c0c00 r4:853c0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85477400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:853c0c00 r8:854721ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:4978 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:4978 tgid:4978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5ddd84 r8:00000002 r7:60000113 r6:eb5ddd8c r5:853c0000 r5:853c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:4980 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:853c1800 r4:853c1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853c1800 r8:8547222c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854771c0 INFO: task kworker/1:705:4980 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d80ef000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853c2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:853c2400 r8:8547232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d828f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:4984 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5f5d84 r8:00000002 r7:60000013 r6:eb5f5d8c r5:853c3000 r4:853c3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85472380 r8:8027ecf4 r7:eb5ede60 r6:85479680 r5:853c3000 INFO: task kworker/1:707:4984 is blocked on a mutex likely owned by task kworker/1:209:3661. Exception stack(0xe044dd20 to 0xe044dd68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:853c3c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547e540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb409000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540538c r4:85405000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540538c r4:85472400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c3c00 r8:8547242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472400 r8:8027ecf4 r7:eb5ede60 r6:85479700 r5:853c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5fdfb0 to 0xeb5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e3c0 INFO: task kworker/1:708:4987 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d87a0000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829189c0 r9:eb5f1d84 r8:00000002 r7:60000013 r6:eb5f1d8c r5:8532e000 r5:8532e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8532e000 r8:854724ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:4991 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb5a5d84 r8:00000002 r7:60000113 r6:eb5a5d8c r5:853c5400 r4:853c5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548ab40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8447238c r4:84472000 r10:00000000 r9:85479780 r8:8027ecf4 r7:eb3c1e60 r6:85479800 r5:853c5400 INFO: task kworker/0:223:4991 is blocked on a mutex likely owned by task kworker/1:209:3661. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/0:224:4992 blocked for more than 465 seconds. r5:853c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85479880 r8:8027ecf4 r7:eb5a5e60 r6:85479900 r5:853c6000 dfa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4995 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:853c6c00 r4:853c6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548a900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85357b8c r4:85357800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85357b8c r4:85479980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c6c00 r8:854799ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85479980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85479980 r8:8027ecf4 r7:eb5a5e60 r6:85479a00 r5:853c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:853c4800 r4:853c4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540638c r4:85406000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540638c r4:85472580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c4800 r8:854725ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472580 r8:8027ecf4 r7:eb5ede60 r6:85479a80 r5:853c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e9c0 INFO: task kworker/1:710:4996 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: d96b6000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) task:kworker/1:711 state:D stack:0 pid:4999 tgid:4999 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853c8000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ec00 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853c8000 r8:8547262c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:711:4999 is blocked on a mutex likely owned by task kworker/1:209:3661. [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 r5:00001000 r4:ee5d1000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853c8c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ee00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: da051000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5004 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:713 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb621d84 r8:00000002 r7:60000113 r6:eb621d8c r5:853cb000 r4:853cb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85491740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb655000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540838c r4:85408000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540838c r4:85472700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cb000 r8:8547272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472700 r8:8027ecf4 r7:eb61de60 r6:85479c00 r5:853cb000 1fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe044dfb0 to 0xe044dff8) task:kworker/0:226 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853cbc00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85357f8c r4:85357c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8548ad40 Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: da391000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:714:5006 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:714 state:D stack:0 pid:5006 tgid:5006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:853cc800 r4:853cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ef80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85406b8c r4:85406800 r7:ddde2d40 r6:83018200 r5:85406b8c r4:85472780 r10:00000000 r9:85472780 r8:8027ecf4 r7:eb621e60 r6:85479d80 r5:853cc800 r4:8547eb00 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853ca400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853ca400 r8:8547282c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472800 r8:8027ecf4 r7:eb621e60 r6:85479e00 r5:853ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547e940 INFO: task kworker/1:715:5009 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: da927000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:5010 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb605d84 r8:00000002 r7:60000013 r6:eb605d8c r5:8532c800 r4:8532c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85471080 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8532c800 r8:854728ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8540778c r4:85472980 r10:00000000 r9:85472980 r8:8027ecf4 r7:eb621e60 r6:85472a00 r5:8532ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854911c0 INFO: task kworker/1:717:5014 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dafa5000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:5016 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb64dd84 r8:00000002 r7:60000013 r6:eb64dd8c r5:854a0000 r4:854a0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854910c0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:854a0000 r8:85472aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb64dfb0 to 0xeb64dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:718:5016 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: db44f000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:719:5017 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:5017 tgid:5017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb641d84 r8:00000002 r7:60000013 r6:eb641d8c r5:854a1800 r4:854a1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85491280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85407f8c r4:85407c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85407f8c r4:85472b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a1800 r8:85472bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85472b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85472b80 r8:8027ecf4 r7:eb621e60 r6:85472c00 r5:854a1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85491100 INFO: task kworker/1:719:5017 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dba7a000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5018 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb659d84 r8:00000002 r7:60000113 r6:eb659d8c r5:854a2400 r4:854a2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:8540878c r4:85408400 r4:85472c80 9fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:5022 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:854a3000 r4:854a3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85408f8c r4:85472d80 dfa0: 00000000 00000000 00000000 00000000 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r4:00000000 r5:8495af8c r4:8495ac00 r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:854a3c00 r4:854a3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854a3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8476d900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84471f8c r4:84471c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84471f8c r4:85479e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a3c00 r8:85479eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85479e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85479e80 r8:8027ecf4 r7:eb5a5e60 r6:85472e80 r5:854a3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 r4:00000000 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:722:5025 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:722 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854a4800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb66dfb0 to 0xeb66dff8) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: dbd34000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:723:5027 blocked for more than 466 seconds. r5:854a5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:854a5400 r8:8549402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:854a6000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85494100 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854919c0 INFO: task kworker/1:724:5029 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dc6df000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:5031 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:725 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:854a6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854a0c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85494300 r8:8027ecf4 r7:eb545e60 r6:85494380 r5:854a0c00 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:5035 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:8532bc00 r4:8532bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8532bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85491fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8532bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85409f8c r4:85409c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85409f8c r4:85494400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8532bc00 r8:8549442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494400 r8:8027ecf4 r7:eb545e60 r6:85494480 r5:8532bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:728:5037 blocked for more than 466 seconds. r4:854a8c00 r5:854a8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540a38c r4:8540a000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540a38c r4:85494500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a8c00 r8:8549452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494500 r8:8027ecf4 r7:eb545e60 r6:85494580 r5:854a8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85398100 INFO: task kworker/1:728:5037 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) r4:82ac11e4 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:729:5038 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:729 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb695d84 r8:00000002 r7:60000013 r6:eb695d8c r5:853c9800 r4:853c9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:729:5038 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd304000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847a6d80 Exception stack(0xe044dfb0 to 0xe044dff8) INFO: task kworker/1:730:5042 blocked for more than 466 seconds. r4:853cd400 r5:853cd400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85398440 Call trace: dd60: 80070013 ffffffff r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:731 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6a5d84 r8:00000002 r7:60000013 r6:eb6a5d8c r5:8486ec00 r4:8486ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8486ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540bb8c r4:8540b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540bb8c r4:85494700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486ec00 r8:8549472c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494700 r8:8027ecf4 r7:eb6a1e60 r6:851a6000 r5:8486ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85398440 INFO: task kworker/1:731:5043 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd9f9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a81800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853987c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540b38c r4:8540b000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540b38c r4:85494780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a81800 r8:854947ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494780 r8:8027ecf4 r7:eb6a5e60 r6:851a6080 r5:84a81800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853985c0 INFO: task kworker/1:732:5046 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: dd9f9000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 INFO: task kworker/1:733:5047 blocked for more than 466 seconds. r5:84a82400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8540b78c r4:85494800 5fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:734 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a80000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r10:61c88647 r9:84a80000 r8:854948ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 Not tainted 6.15.0-syzkaller #0 r4:84a80c00 r5:84a80c00 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de34e000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:5053 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:5053 tgid:5053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:84a83c00 r4:84a83c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a83c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85398dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541438c r4:85494980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83c00 r8:854949ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494980 r8:8027ecf4 r7:eb6b9e60 r6:851a6280 r5:84a83c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85398d00 INFO: task kworker/1:736:5053 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: de7f3000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84a84800 r5:84a84800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:738 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854a8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:854ab000 r4:854ab000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ab000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85415b8c r4:85415800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85415b8c r4:85494b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ab000 r8:85494bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494b80 r8:8027ecf4 r7:eb6d1e60 r6:85494c00 r5:854ab000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852f5140 INFO: task kworker/1:739:5060 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: ded73000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:854abc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r9:83018205 r8:854abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 r10:61c88647 r9:854abc00 r8:85494cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 dd20: df382000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6d80 r8:8027ecf4 r7:e0451e60 r6:847a6e00 r5:84b74800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe044dfb0 to 0xe044dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:741:5064 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:741 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6d9d84 r8:00000002 r7:60000113 r6:eb6d9d8c r5:854ad400 r4:854ad400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ad400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8541578c r4:85494d80 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: r5:854ae000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85494e80 r8:8027ecf4 r7:eb6c9e60 r6:85494f00 r5:854ae000 task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e044ddc0 r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb6e1d84 r8:00000002 r7:60000013 r6:eb6e1d8c r5:854ac800 r4:854ac800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ac800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb221000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85415f8c r4:85415c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85415f8c r4:85494f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ac800 r8:85494fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85494f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85494f80 r8:8027ecf4 r7:eb6dde60 r6:852e9000 r5:854ac800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852f5240 INFO: task kworker/1:743:5067 is blocked on a mutex likely owned by task kworker/1:209:3661. task:kworker/1:209 state:R running task stack:0 pid:3661 tgid:3661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b74800 r8:80200be4 r7:e044dd54 r6:ffffffff r5:84b74800 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe044dd20 to 0xe044dd68) dd20: df77d000 dfdd3000 00000001 80239b98 7f843000 00000001 82ac11c4 82ac05a0 dd40: 7f843000 dfdd3000 8280c9b4 e044dd9c e044dda0 e044dd70 80230ad4 80239bb0 dd60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e044ddc0 r5:e044de08 r4:e044ddc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b74800 r7:00000000 r6:83018200 r5:00001000 r4:7f845000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee5d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495af8c r4:8495ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495af8c r4:847a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b74800 r8:847a6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84a86c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:851a6380 r8:8027ecf4 r7:eb5a5e60 r6:851a6400 r5:84a86c00 INFO: task kworker/0:228:5070 is blocked on a mutex likely owned by task kworker/1:209:3661. dd60: 80070013 ffffffff r4:e044ddc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6d80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84a85400 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9340 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85416b8c r4:851a6480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a85400 r8:851a64ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6480 r8:8027ecf4 r7:eb6d5e60 r6:851a6500 r5:84a85400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8548a080 INFO: task kworker/0:229:5071 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 7f971000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5073 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: r5:84a86000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84a83000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541678c r4:85416400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541678c r4:852e9100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83000 r8:852e912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9100 r8:8027ecf4 r7:eb6ede60 r6:851a6600 r5:84a83000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:853ce000 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:82ac11e4 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0451fb0 to 0xe0451ff8) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08 r10:61c88647 r9:854b1800 r8:852e922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:5083 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb709d84 r8:00000002 r7:60000113 r6:eb709d8c r5:854b0000 r4:854b0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85440f8c r4:85440c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85440f8c r4:851a6780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b0000 r8:851a67ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6780 r8:8027ecf4 r7:eb6d5e60 r6:851a6800 r5:854b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb709fb0 to 0xeb709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d9200 INFO: task kworker/0:230:5083 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:854aec00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7100 r7:ddde2d40 r6:83018200 r5:85417b8c r4:852e9280 9fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb6f5d84 r8:00000002 r7:60000113 r6:eb6f5d8c r5:854a9800 r5:854a9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541778c r4:85417400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541778c r4:852e9380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a9800 r8:852e93ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9380 r8:8027ecf4 r7:eb6e9e60 r6:852e9400 r5:854a9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852f5dc0 INFO: task kworker/1:749:5085 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 80ba7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:750:5087 blocked for more than 466 seconds. r4:854aa400 r5:854aa400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85417f8c r4:852e9480 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:751:5090 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:751 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb711d84 r8:00000002 r7:60000113 r6:eb711d8c r5:854b8000 r4:854b8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d74c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb717000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541c38c r4:8541c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541c38c r4:852e9580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8000 r8:852e95ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9580 r8:8027ecf4 r7:eb705e60 r6:852e9600 r5:854b8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d7180 INFO: task kworker/1:751:5090 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 814ba000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854b9800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d75c0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 814ba000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:753:5094 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:753 state:D stack:0 pid:5094 tgid:5094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb72dd84 r8:00000002 r7:60000013 r6:eb72dd8c r5:854b0c00 r4:854b0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854b3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541cf8c r4:8541cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541cf8c r4:852e9800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b3000 r8:852e982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9800 r8:8027ecf4 r7:eb72de60 r6:851a6900 r5:854b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d7740 INFO: task kworker/1:754:5096 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 81645000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/1:755:5098 blocked for more than 467 seconds. r5:854b3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:854b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 r10:61c88647 r9:854b3c00 r8:852e98ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: 81a31000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:00000001 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:854b4800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r9:83018205 r8:854b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 r10:61c88647 r9:854b4800 r8:852e992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 81a31000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5102 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5102 tgid:5102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb765d84 r8:00000002 r7:60000013 r6:eb765d8c r5:854b5400 r4:854b5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541df8c r4:8541dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541df8c r4:852e9980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b5400 r8:852e99ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9980 r8:8027ecf4 r7:eb751e60 r6:851a6a80 r5:854b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5104 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb769d84 r8:00000002 r7:60000013 r6:eb769d8c r5:854b6000 r4:854b6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541db8c r4:8541d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:854b6000 r8:852e9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 task:kworker/1:759 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854b6c00 r4:829189bc r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d7f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb777000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e38c r4:8541e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541e38c r4:852e9a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b6c00 r8:852e9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9a80 r8:8027ecf4 r7:eb765e60 r6:851a6b80 r5:854b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d7340 INFO: task kworker/1:759:5106 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8254a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5108 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:854ba400 r4:854ba400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ba400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544078c r4:85440400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8544078c r4:852e9b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:852e9b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9b00 r8:8027ecf4 r7:eb775e60 r6:852e9b80 r5:854ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d7b80 INFO: task kworker/1:760:5108 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 82787000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5109 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:761 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb449d84 r8:00000002 r7:60000113 r6:eb449d8c r5:854b8c00 r4:854b8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541f38c r4:8541f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541f38c r4:852e9c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8c00 r8:852e9c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9c00 r8:8027ecf4 r7:eb721e60 r6:852e9c80 r5:854b8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d7b80 INFO: task kworker/1:761:5109 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 82a30000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5110 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5110 tgid:5110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb715d84 r8:00000002 r7:60000113 r6:eb715d8c r5:854bbc00 r4:854bbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847950c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc59000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541e78c r4:8541e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541e78c r4:852e9d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bbc00 r8:852e9d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9d00 r8:8027ecf4 r7:eb449e60 r6:852e9d80 r5:854bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852d7b80 INFO: task kworker/1:762:5110 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 82c03000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5112 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5112 tgid:5112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:854bc800 r4:854bc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473d9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541ef8c r4:8541ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541ef8c r4:852e9e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bc800 r8:852e9e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852e9e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e9e00 r8:8027ecf4 r7:eb449e60 r6:852e9e80 r5:854bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb615fb0 to 0xeb615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84795000 INFO: task kworker/1:763:5112 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8321c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:5117 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb791d84 r8:00000002 r7:60000013 r6:eb791d8c r5:854be000 r4:854be000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854be000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854be000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544278c r4:85442400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544278c r4:851a6c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854be000 r8:851a6c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6c00 r8:8027ecf4 r7:eb6d5e60 r6:852e9f00 r5:854be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0180 INFO: task kworker/0:231:5117 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8321c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:5118 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb795d84 r8:00000002 r7:60000013 r6:eb795d8c r5:854bec00 r4:854bec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea989000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544178c r4:85441400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544178c r4:851a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bec00 r8:851a6cac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6c80 r8:8027ecf4 r7:eb791e60 r6:852e9f80 r5:854bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0180 INFO: task kworker/0:232:5118 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8369f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:5120 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb79dd84 r8:00000002 r7:60000013 r6:eb79dd8c r5:854c0000 r4:854c0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab69000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85441b8c r4:85441800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85441b8c r4:851a6d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c0000 r8:851a6d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6d00 r8:8027ecf4 r7:eb791e60 r6:8478a000 r5:854c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0300 INFO: task kworker/0:233:5120 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8369f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:5122 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:854b2400 r4:854b2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854b2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85441f8c r4:85441c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85441f8c r4:851a6d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b2400 r8:851a6dac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6d80 r8:8027ecf4 r7:eb791e60 r6:851a6e00 r5:854b2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e04c0 INFO: task kworker/0:234:5122 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 83ae1000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:5125 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7a5d84 r8:00000002 r7:60000013 r6:eb7a5d8c r5:853cec00 r4:853cec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead85000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544238c r4:85442000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544238c r4:851a6e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cec00 r8:851a6eac r7:82804d40 r6:dddced40 r5:dddced60 r4:851a6e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851a6e80 r8:8027ecf4 r7:eb791e60 r6:851a6f00 r5:853cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0600 INFO: task kworker/0:235:5125 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 83ae1000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:5127 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7a9d84 r8:00000002 r7:60000013 r6:eb7a9d8c r5:84a10000 r4:84a10000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a10000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a10000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a10000 r8:851a6fac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 83f2d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:5129 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7add84 r8:00000002 r7:60000113 r6:eb7add8c r5:84a10c00 r4:84a10c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a10c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85442f8c r4:85442c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85442f8c r4:85041080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a10c00 r8:850410ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041080 r8:8027ecf4 r7:eb7a9e60 r6:85041100 r5:84a10c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0a00 INFO: task kworker/0:237:5129 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 843a0000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:5131 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7b1d84 r8:00000002 r7:60000013 r6:eb7b1d8c r5:84a11800 r4:84a11800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a11800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a11800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf37000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544338c r4:85443000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544338c r4:85041180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a11800 r8:850411ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041180 r8:8027ecf4 r7:eb7ade60 r6:85041200 r5:84a11800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0b00 INFO: task kworker/0:238:5131 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 843a0000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:5133 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7b5d84 r8:00000002 r7:60000013 r6:eb7b5d8c r5:84a12400 r4:84a12400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a12400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d9fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a12400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8544378c r4:85443400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8544378c r4:85041280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a12400 r8:850412ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041280 r8:8027ecf4 r7:eb7b1e60 r6:85041300 r5:84a12400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b5fb0 to 0xeb7b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0d80 INFO: task kworker/0:239:5133 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8488e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:5136 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:5136 tgid:5136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7b9d84 r8:00000002 r7:60000013 r6:eb7b9d8c r5:84a13000 r4:84a13000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a13000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85497500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a13000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafaf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85443b8c r4:85443800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85443b8c r4:85041380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a13000 r8:850413ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041380 r8:8027ecf4 r7:eb7b5e60 r6:85041400 r5:84a13000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e0e00 INFO: task kworker/0:240:5136 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 84ef3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:5137 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84789140 task:kworker/0:242 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854c3000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854c3000 r8:8504152c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:5140 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:5140 tgid:5140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:854c3c00 r4:854c3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fc280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb353000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499078c r4:84990400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499078c r4:85041580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c3c00 r8:850415ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041580 r8:8027ecf4 r7:eb7cde60 r6:8478a180 r5:854c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc0c0 INFO: task kworker/0:243:5140 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 85511000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:5142 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:854c1800 r4:854c1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8545038c r4:85041600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:5144 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:5144 tgid:5144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7e5d84 r8:00000002 r7:60000113 r6:eb7e5d8c r5:854c5400 r4:854c5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fc5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb395000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545078c r4:85450400 r7:dddced40 r6:83018000 r5:8545078c r4:85041680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:5146 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:5146 tgid:5146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:854c6000 r4:854c6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85452b8c r4:85452800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85452b8c r4:85041700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c6000 r8:8504172c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041700 r8:8027ecf4 r7:eb7cde60 r6:8478a300 r5:854c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc3c0 INFO: task kworker/0:246:5146 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 85b02000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:5148 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7f5d84 r8:00000002 r7:60000113 r6:eb7f5d8c r5:854c0c00 r4:854c0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fc800 r5:00001000 r4:eb411000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85450f8c r4:85450c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85450f8c r4:85041780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c0c00 r8:850417ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041780 r8:8027ecf4 r7:eb7ede60 r6:8478a380 r5:854c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc4c0 INFO: task kworker/0:247:5148 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 85e6d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:5150 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7fdd84 r8:00000002 r7:60000013 r6:eb7fdd8c r5:854c4800 r4:854c4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fc900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb443000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545138c r4:85451000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545138c r4:85041880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c4800 r8:850418ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041880 r8:8027ecf4 r7:eb7ede60 r6:8478a400 r5:854c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7fdfb0 to 0xeb7fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc900 INFO: task kworker/0:248:5150 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 86419000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:5152 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:5152 tgid:5152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb805d84 r8:00000002 r7:60000113 r6:eb805d8c r5:854bd400 r4:854bd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fcac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545178c r4:85451400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545178c r4:85041800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bd400 r8:8504182c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041800 r8:8027ecf4 r7:eb7ede60 r6:8478a480 r5:854bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc700 INFO: task kworker/0:249:5152 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 86419000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:847a6c80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:854bb000 r4:854bb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854bb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fcbc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85451b8c r4:85451800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85451b8c r4:85041900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bb000 r8:8504192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041900 r8:8027ecf4 r7:eb7ede60 r6:8478a500 r5:854bb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc940 INFO: task kworker/0:250:5154 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 86419000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:5156 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:5156 tgid:5156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb815d84 r8:00000002 r7:60000113 r6:eb815d8c r5:854c8c00 r4:854c8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fccc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85451f8c r4:85451c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85451f8c r4:85041980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8c00 r8:850419ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041980 r8:8027ecf4 r7:eb7ede60 r6:8478a580 r5:854c8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fcc00 INFO: task kworker/0:251:5156 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 86419000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:5158 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:5158 tgid:5158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb81dd84 r8:00000002 r7:60000013 r6:eb81dd8c r5:854c8000 r4:854c8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb81de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fce40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb497000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545238c r4:85452000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545238c r4:85041a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8000 r8:85041a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041a00 r8:8027ecf4 r7:eb7ede60 r6:8478a600 r5:854c8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb81dfb0 to 0xeb81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fc700 INFO: task kworker/0:252:5158 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 86c10000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:5160 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:854c9800 r4:854c9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fcec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545278c r4:85452400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545278c r4:85041a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c9800 r8:85041aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041a80 r8:8027ecf4 r7:eb7ede60 r6:8478a680 r5:854c9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:851fcc40 INFO: task kworker/0:253:5160 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 86c10000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:5162 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb82dd84 r8:00000002 r7:60000013 r6:eb82dd8c r5:854cbc00 r4:854cbc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cbc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb82de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545338c r4:85453000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545338c r4:85041b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cbc00 r8:85041b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041b00 r8:8027ecf4 r7:eb7ede60 r6:8478a700 r5:854cbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0451d20 to 0xe0451d68) 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:5164 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:854cb000 r4:854cb000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cb000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fcf00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85452f8c r4:85452c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85452f8c r4:85041b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cb000 r8:85041bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041b80 r8:8027ecf4 r7:eb82de60 r6:8478a780 r5:854cb000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84795380 INFO: task kworker/0:255:5164 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 870ec000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:5166 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb83dd84 r8:00000002 r7:60000013 r6:eb83dd8c r5:854ca400 r4:854ca400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ca400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb517000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85453b8c r4:85453800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85453b8c r4:85041c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ca400 r8:85041c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041c00 r8:8027ecf4 r7:eb82de60 r6:8478a800 r5:854ca400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d080 INFO: task kworker/0:256:5166 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 87550000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:5168 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb845d84 r8:00000002 r7:60000113 r6:eb845d8c r5:854cc800 r4:854cc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb505000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545378c r4:85453400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545378c r4:85041c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cc800 r8:85041cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041c80 r8:8027ecf4 r7:eb83de60 r6:8478a880 r5:854cc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d140 INFO: task kworker/0:257:5168 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 878a8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:5170 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:854cd400 r4:854cd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb84de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85453f8c r4:85453c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85453f8c r4:85041d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cd400 r8:85041d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041d00 r8:8027ecf4 r7:eb83de60 r6:8478a900 r5:854cd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d2c0 INFO: task kworker/0:258:5170 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 878a8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:5172 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:5172 tgid:5172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb855d84 r8:00000002 r7:60000113 r6:eb855d8c r5:854ce000 r4:854ce000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ce000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454b8c r4:85454800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85454b8c r4:85041d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ce000 r8:85041dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041d80 r8:8027ecf4 r7:eb84de60 r6:8478a980 r5:854ce000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d280 INFO: task kworker/0:259:5172 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 87d23000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:5174 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb85dd84 r8:00000002 r7:60000013 r6:eb85dd8c r5:854cec00 r4:854cec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854cec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545438c r4:85454000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545438c r4:85041e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cec00 r8:85041e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041e00 r8:8027ecf4 r7:eb855e60 r6:8478aa00 r5:854cec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d440 INFO: task kworker/0:260:5174 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 87d23000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:5176 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb865d84 r8:00000002 r7:60000113 r6:eb865d8c r5:854d0c00 r4:854d0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547d800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545478c r4:85454400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545478c r4:85041e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d0c00 r8:85041eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041e80 r8:8027ecf4 r7:eb855e60 r6:8478aa80 r5:854d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d500 INFO: task kworker/0:261:5176 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 88159000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:5179 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:854d0000 r4:854d0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547da40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85454f8c r4:85454c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85454f8c r4:85041f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d0000 r8:85041f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85041f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041f00 r8:8027ecf4 r7:eb855e60 r6:8478ab00 r5:854d0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547d440 INFO: task kworker/0:262:5179 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 88159000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:5186 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:854d1800 r4:854d1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547db80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545538c r4:85455000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545538c r4:85041f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d1800 r8:85041fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85041f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85041f80 r8:8027ecf4 r7:eb871e60 r6:8478ab80 r5:854d1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547dbc0 INFO: task kworker/0:263:5186 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 88628000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:5187 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:854d3000 r4:854d3000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547dc40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545578c r4:85455400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545578c r4:8506e000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d3000 r8:8506e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e000 r8:8027ecf4 r7:eb741e60 r6:8478ac00 r5:854d3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547dbc0 INFO: task kworker/0:264:5187 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 88628000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:5188 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb735d84 r8:00000002 r7:60000113 r6:eb735d8c r5:854d3c00 r4:854d3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85455b8c r4:85455800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85455b8c r4:8506e080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d3c00 r8:8506e0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e080 r8:8027ecf4 r7:eb74de60 r6:8478ac80 r5:854d3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547dbc0 INFO: task kworker/0:265:5188 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e0451dc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854d5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85455f8c r4:8506e100 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:5191 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:854d2400 r4:854d2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 task:kworker/0:268 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:84a13c00 r4:84a13c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a13c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548fa80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85457b8c r4:85457800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85457b8c r4:8506e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a13c00 r8:8506e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e200 r8:8027ecf4 r7:eb77de60 r6:8506e280 r5:84a13c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547dfc0 INFO: task kworker/0:268:5192 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 88ecf000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a14800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539c240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a14800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545678c r4:85456400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545678c r4:8506e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a14800 r8:8506e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e300 r8:8027ecf4 r7:eb7bde60 r6:8506e380 r5:84a14800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb785fb0 to 0xeb785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8547dfc0 INFO: task kworker/0:269:5194 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 89877000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 r5:00001000 r4:ee619000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5195 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb879d84 r8:00000002 r7:60000013 r6:eb879d8c r5:84a15400 r4:84a15400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a15400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a16c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r9:83018205 r8:84a16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8541ff8c r4:8541fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8541ff8c r4:8478ae80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a16c00 r8:8478aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478ae80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ae80 r8:8027ecf4 r7:eb879e60 r6:8506e480 r5:84a16c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539e280 INFO: task kworker/1:765:5199 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 89b05000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:83b59800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 89b05000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:83b58000 r4:83b58000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b58000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ea80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83b58000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b3000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb891fb0 to 0xeb891ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e0451dc0 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:5204 tgid:5204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:83b5a400 r4:83b5a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b5a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ce80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85456b8c r4:85456800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85456b8c r4:8506e600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5a400 r8:8506e62c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb899d84 r8:00000002 r7:60000013 r6:eb899d8c r5:83b5b000 r5:83b5b000 r4:829189bc r4:00000000 r4:00000000 r9:83018205 r8:83b5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb007000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84330b8c r4:84330800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84330b8c r4:8539a000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b5b000 r8:8539a02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8539a000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a000 r8:8027ecf4 r7:eb891e60 r6:8506e700 r5:83b5b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539e4c0 INFO: task kworker/1:768:5205 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8a31d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:769 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854d4800 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dc38c r4:852dc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dc38c r4:8539a080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d4800 r8:8539a0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8539a080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a080 r8:8027ecf4 r7:eb891e60 r6:8539a100 r5:854d4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80070013 ffffffff r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:854d6c00 r5:854d6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852dcb8c r4:852dc800 r10:61c88647 r9:854d6c00 r8:8539a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:771:5213 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:771 state:D stack:0 pid:5213 tgid:5213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:854d6000 r5:854d6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:00001000 r4:eb233000 r7:ddde2d40 r6:83018200 r5:852dd38c r4:8539a280 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5214 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8a9d84 r8:00000002 r7:60000113 r6:eb8a9d8c r5:854c6c00 r4:854c6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854c6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ed00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dcf8c r4:852dcc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dcf8c r4:8539a380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c6c00 r8:8539a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8539a380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a380 r8:8027ecf4 r7:eb8a5e60 r6:8539a400 r5:854c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539eb80 INFO: task kworker/1:772:5214 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8a9fb000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/1:773:5216 blocked for more than 468 seconds. r5:85548000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85548000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb259000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dd78c r4:852dd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dd78c r4:8539a480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85548000 r8:8539a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8539a480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a480 r8:8027ecf4 r7:eb8a5e60 r6:8539a500 r5:85548000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539ee00 INFO: task kworker/1:773:5216 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8a9fb000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:774 state:D stack:0 pid:5218 tgid:5218 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85548c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548d340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8554a400 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb275000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ddb8c r4:852dd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852ddb8c r4:8539a680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554a400 r8:8539a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8539a680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a680 r8:8027ecf4 r7:eb8b1e60 r6:8539a700 r5:8554a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539e1c0 INFO: task kworker/1:775:5220 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8b07a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Not tainted 6.15.0-syzkaller #0 r4:8554b000 r5:8554b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852ddf8c r4:852ddc00 r10:61c88647 r9:8554b000 r8:8539a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8554bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb547000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85456f8c r4:85456c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85456f8c r4:8506e780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554bc00 r8:8506e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e780 r8:8027ecf4 r7:eb7bde60 r6:8539a880 r5:8554bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8539cd00 INFO: task kworker/0:271:5224 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8b530000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829189c0 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:8554d400 r5:8554d400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8539a900 r8:8027ecf4 r7:eb8b1e60 r6:8539a980 r5:8554d400 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:5228 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8cdd84 r8:00000002 r7:60000113 r6:eb8cdd8c r5:8554e000 r4:8554e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8554e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8548f940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8554e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8545778c r4:85457400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8545778c r4:8506e800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554e000 r8:8506e82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e800 r8:8027ecf4 r7:eb7bde60 r6:8539aa00 r5:8554e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85465ac0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8539aa80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539aa80 r8:8027ecf4 r7:eb8c5e60 r6:8539ab00 r5:8554c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85465800 INFO: task kworker/1:778:5230 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8b776000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:779 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8539ab80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:eb8bdd84 r8:00000002 r7:60000013 r6:eb8bdd8c r5:85549800 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8539ac80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ac80 r8:8027ecf4 r7:eb8b5e60 r6:8539ad00 r5:85549800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85465b00 INFO: task kworker/1:780:5234 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8bbca000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5236 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8d1d84 r8:00000002 r7:60000013 r6:eb8d1d8c r5:85550000 r4:85550000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85550000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5237 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8d9d84 r8:00000002 r7:60000113 r6:eb8d9d8c r5:85550c00 r4:85550c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85550c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473280 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85550c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6c5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dff8c r4:852dfc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852dff8c r4:8539ae80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85550c00 r8:8539aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8539ae80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ae80 r8:8027ecf4 r7:eb8bde60 r6:8539af00 r5:85550c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85465e80 INFO: task kworker/1:782:5237 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8c4e6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r4:847a6c80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08 r10:61c88647 r9:85551800 r8:8539afac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8c56e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:784:5242 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:784 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5244 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85553000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb73d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dc78c r4:854dc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854dc78c r4:85468180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85553000 r8:854681ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468180 r8:8027ecf4 r7:eb8e1e60 r6:85468200 r5:85553000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854732c0 INFO: task kworker/1:785:5244 is blocked on a mutex likely owned by task kworker/1:208:3660. Call trace: [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85553c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb759000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854dcb8c r4:854dc800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854dcb8c r4:85468280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85553c00 r8:854682ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468280 r8:8027ecf4 r7:eb8e5e60 r6:85468300 r5:85553c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8cd8d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:85555400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:854dcf8c r4:85468380 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:e0451dc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85473b80 r7:ddde2d40 r6:83018200 r5:854dd38c r4:85468480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85556c00 r8:854684ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468480 r8:8027ecf4 r7:eb8dde60 r6:85468500 r5:85556c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f9fb0 to 0xeb8f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85473800 INFO: task kworker/1:788:5249 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8d0a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:789:5252 blocked for more than 468 seconds. task:kworker/1:789 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:854dd78c r4:85468580 Exception stack(0xeb789fb0 to 0xeb789ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 r4:00000000 r5:00001000 r4:ee619000 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5254 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb8edd84 r8:00000002 r7:60000113 r6:eb8edd8c r5:85558c00 r4:85558c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85558c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539cf40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85558c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ddf8c r4:854ddc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ddf8c r4:85468680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85558c00 r8:854686ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468680 r8:8027ecf4 r7:eb789e60 r6:85468700 r5:85558c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85473c00 INFO: task kworker/1:790:5254 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8d354000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/1:791 state:D stack:0 pid:5256 tgid:5256 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb861fb0 to 0xeb861ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:792 state:D stack:0 pid:5259 tgid:5259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb905d84 r8:00000002 r7:60000113 r6:eb905d8c r5:8555a400 r4:8555a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8555a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ee40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8555a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0693000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854de38c r4:854de000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854de38c r4:85468880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555a400 r8:854688ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468880 r8:8027ecf4 r7:eb8ede60 r6:85468900 r5:8555a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85473ec0 INFO: task kworker/1:792:5259 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8db50000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829189c0 r9:eb909d84 r8:00000002 r7:60000113 r6:eb909d8c r5:8555b000 r4:00000000 r5:00001000 r4:ea9a9000 r10:61c88647 r9:8555b000 r8:854689ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5262 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5262 tgid:5262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb90dd84 r8:00000002 r7:60000113 r6:eb90dd8c r5:8555bc00 r4:8555bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8555bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8555bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabaf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854deb8c r4:854de800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854deb8c r4:85468a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555bc00 r8:85468aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468a80 r8:8027ecf4 r7:eb909e60 r6:85468b00 r5:8555bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb90dfb0 to 0xeb90dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84789140 task:kworker/1:795 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:8555c800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85480180 INFO: task kworker/1:795:5264 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8e091000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5265 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5265 tgid:5265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb919d84 r8:00000002 r7:60000013 r6:eb919d8c r5:8555d400 r4:8555d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8555d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854806c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8555d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854df38c r4:854df000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854df38c r4:85468c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555d400 r8:85468cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468c80 r8:8027ecf4 r7:eb911e60 r6:85468d00 r5:8555d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85480180 INFO: task kworker/1:796:5265 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8e4cf000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:854dff8c r4:85468d80 Exception stack(0xeb915fb0 to 0xeb915ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5270 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb921d84 r8:00000002 r7:60000013 r6:eb921d8c r5:8555ec00 r4:8555ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8555ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854807c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8555ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854df78c r4:854df400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854df78c r4:85468e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8555ec00 r8:85468eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85468e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85468e80 r8:8027ecf4 r7:eb915e60 r6:85468f00 r5:8555ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:799 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85554800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r10:61c88647 r9:85554800 r8:85468fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8ed4d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5274 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:800 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb929d84 r8:00000002 r7:60000013 r6:eb929d8c r5:85556000 r4:85556000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85556000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e780 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85556000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e938c r4:854e9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e938c r4:8549c080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85556000 r8:8549c0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c080 r8:8027ecf4 r7:eb915e60 r6:8549c100 r5:85556000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854808c0 INFO: task kworker/1:800:5274 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8ed4d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5277 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:801 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb931d84 r8:00000002 r7:60000013 r6:eb931d8c r5:85561800 r4:85561800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85561800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85561800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb167000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e838c r4:854e8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e838c r4:8549c180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85561800 r8:8549c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c180 r8:8027ecf4 r7:eb929e60 r6:8549c200 r5:85561800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85480b80 INFO: task kworker/1:801:5277 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8ed4d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:802:5279 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:802 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb935d84 r8:00000002 r7:60000013 r6:eb935d8c r5:85560c00 r4:85560c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85560c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480f00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85560c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e878c r4:854e8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e878c r4:8549c280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85560c00 r8:8549c2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c280 r8:8027ecf4 r7:eb929e60 r6:8549c300 r5:85560c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85480a40 INFO: task kworker/1:802:5279 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8f1db000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5281 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:85560000 r4:85560000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85560000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e440 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85560000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e8b8c r4:854e8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e8b8c r4:8549c380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85560000 r8:8549c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c380 r8:8027ecf4 r7:eb929e60 r6:8549c400 r5:85560000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85480c40 INFO: task kworker/1:803:5281 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8f6a6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:5282 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:85563c00 r4:85563c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85563c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84797640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85563c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e073b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fc38c r4:854fc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fc38c r4:8506e880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85563c00 r8:8506e8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e880 r8:8027ecf4 r7:eb7bde60 r6:8549c480 r5:85563c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8548f900 INFO: task kworker/0:273:5282 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8f6a6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:5284 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb949d84 r8:00000002 r7:60000113 r6:eb949d8c r5:85564800 r4:85564800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85564800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847977c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85564800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84990f8c r4:84990c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84990f8c r4:8506e900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85564800 r8:8506e92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506e900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506e900 r8:8027ecf4 r7:eb945e60 r6:8549c500 r5:85564800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8548f900 INFO: task kworker/0:274:5284 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8faf7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5286 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb94dd84 r8:00000002 r7:60000113 r6:eb94dd8c r5:85563000 r4:85563000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85563000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85563000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e8f8c r4:854e8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e8f8c r4:8549c580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85563000 r8:8549c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c580 r8:8027ecf4 r7:eb929e60 r6:8549c600 r5:85563000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb94dfb0 to 0xeb94dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e3c0 INFO: task kworker/1:804:5286 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8fdee000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:5289 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:85562400 r4:85562400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85562400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ea00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85562400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e9b8c r4:854e9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e9b8c r4:8549c680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85562400 r8:8549c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c680 r8:8027ecf4 r7:eb929e60 r6:8549c700 r5:85562400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e400 INFO: task kworker/1:805:5289 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8fdee000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5291 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb92dd84 r8:00000002 r7:60000013 r6:eb92dd8c r5:85566000 r4:85566000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85566000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501e740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85566000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb49b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e978c r4:854e9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e978c r4:8549c780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85566000 r8:8549c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c780 r8:8027ecf4 r7:eb941e60 r6:8549c800 r5:85566000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e680 INFO: task kworker/1:806:5291 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 8feef000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:807:5293 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:807 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb91dd84 r8:00000002 r7:60000113 r6:eb91dd8c r5:85566c00 r4:85566c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85566c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85566c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5af000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eab8c r4:854ea800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854eab8c r4:8549c880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85566c00 r8:8549c8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c880 r8:8027ecf4 r7:eb941e60 r6:8549c900 r5:85566c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501e800 INFO: task kworker/1:807:5293 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 90376000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:808:5295 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:808 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb951d84 r8:00000002 r7:60000113 r6:eb951d8c r5:85565400 r4:85565400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85565400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb951e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ebc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85565400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854e9f8c r4:854e9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854e9f8c r4:8549c980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85565400 r8:8549c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549c980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549c980 r8:8027ecf4 r7:eb91de60 r6:8549ca00 r5:85565400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501ea40 INFO: task kworker/1:808:5295 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 906d7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5297 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb959d84 r8:00000002 r7:60000113 r6:eb959d8c r5:85568c00 r4:85568c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb959e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501ed40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85568c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4fb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ea38c r4:854ea000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ea38c r4:8549ca80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568c00 r8:8549caac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549ca80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549ca80 r8:8027ecf4 r7:eb91de60 r6:8549cb00 r5:85568c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb959fb0 to 0xeb959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501eb40 INFO: task kworker/1:809:5297 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 906d7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:810:5300 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:810 state:D stack:0 pid:5300 tgid:5300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb95dd84 r8:00000002 r7:60000113 r6:eb95dd8c r5:8556a400 r4:8556a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8501efc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556a400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ea78c r4:854ea400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ea78c r4:8549cb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556a400 r8:8549cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549cb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549cb80 r8:8027ecf4 r7:eb91de60 r6:8549cc00 r5:8556a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85480c40 INFO: task kworker/1:810:5300 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 90b3c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:5301 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb961d84 r8:00000002 r7:60000013 r6:eb961d8c r5:8556b000 r4:8556b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb961e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6180 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eaf8c r4:854eac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854eaf8c r4:8549cc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556b000 r8:8549ccac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549cc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549cc80 r8:8027ecf4 r7:eb91de60 r6:8549cd00 r5:8556b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8501eec0 INFO: task kworker/1:811:5301 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 90b3c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5304 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb955d84 r8:00000002 r7:60000113 r6:eb955d8c r5:8556bc00 r4:8556bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb955e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a62c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eb38c r4:854eb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854eb38c r4:8549cd80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556bc00 r8:8549cdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549cd80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549cd80 r8:8027ecf4 r7:eb961e60 r6:8549ce00 r5:8556bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb955fb0 to 0xeb955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a6000 INFO: task kworker/1:812:5304 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 90f76000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5305 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5305 tgid:5305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:8556c800 r4:8556c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ebb8c r4:854eb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ebb8c r4:8549ce80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556c800 r8:8549ceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549ce80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549ce80 r8:8027ecf4 r7:eb955e60 r6:8549cf00 r5:8556c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a6140 INFO: task kworker/1:813:5305 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 913ef000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5307 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb969d84 r8:00000002 r7:60000113 r6:eb969d8c r5:8556d400 r4:8556d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854eb78c r4:854eb400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854eb78c r4:8549cf80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556d400 r8:8549cfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8549cf80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8549cf80 r8:8027ecf4 r7:eb965e60 r6:852f1000 r5:8556d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb969fb0 to 0xeb969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a63c0 INFO: task kworker/1:814:5307 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 913ef000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5310 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb96dd84 r8:00000002 r7:60000113 r6:eb96dd8c r5:8556e000 r4:8556e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ebf8c r4:854ebc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ebf8c r4:852f1080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556e000 r8:852f10ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1080 r8:8027ecf4 r7:eb965e60 r6:852f1100 r5:8556e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a6400 INFO: task kworker/1:815:5310 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 913ef000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:5311 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb971d84 r8:00000002 r7:60000013 r6:eb971d8c r5:8556ec00 r4:8556ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8556ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f438c r4:854f4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f438c r4:852f1180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556ec00 r8:852f11ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1180 r8:8027ecf4 r7:eb96de60 r6:852f1200 r5:8556ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a6400 INFO: task kworker/1:816:5311 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 919f8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5313 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:85569800 r4:85569800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85569800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85569800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f478c r4:854f4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f478c r4:852f1280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85569800 r8:852f12ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1280 r8:8027ecf4 r7:eb971e60 r6:852f1300 r5:85569800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a6780 INFO: task kworker/1:817:5313 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 919f8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:5316 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:85568000 r4:85568000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85568000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85568000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f4b8c r4:854f4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f4b8c r4:852f1380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568000 r8:852f13ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1380 r8:8027ecf4 r7:eb975e60 r6:852f1400 r5:85568000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb97dfb0 to 0xeb97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a68c0 INFO: task kworker/1:818:5316 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 919f8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:5317 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:85570000 r4:85570000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85570000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85570000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb80f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f538c r4:854f5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f538c r4:852f1480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85570000 r8:852f14ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1480 r8:8027ecf4 r7:eb97de60 r6:852f1500 r5:85570000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb979fb0 to 0xeb979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a69c0 INFO: task kworker/1:819:5317 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 91cd9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:5320 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb981d84 r8:00000002 r7:60000013 r6:eb981d8c r5:85570c00 r4:85570c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85570c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6d80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85570c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f4f8c r4:854f4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f4f8c r4:852f1580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85570c00 r8:852f15ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1580 r8:8027ecf4 r7:eb979e60 r6:852f1600 r5:85570c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a6c00 INFO: task kworker/1:820:5320 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 91f6f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5322 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:85571800 r4:85571800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85571800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b2400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85571800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f5f8c r4:854f5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f5f8c r4:852f1680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85571800 r8:852f16ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1680 r8:8027ecf4 r7:eb979e60 r6:852f1700 r5:85571800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b2000 INFO: task kworker/1:821:5322 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 91f6f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:5324 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:85572400 r4:85572400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85572400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85480fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85572400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f578c r4:854f5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f578c r4:852f1780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85572400 r8:852f17ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1780 r8:8027ecf4 r7:eb98de60 r6:852f1800 r5:85572400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb989fb0 to 0xeb989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b2000 INFO: task kworker/1:822:5324 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 92360000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84789140 task:kworker/1:823 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85573000 r4:829189bc r4:00000000 r4:00000000 r5:854f5b8c r4:854f5800 r4:852f1880 5fa0: 00000000 00000000 00000000 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 92360000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5328 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:85573c00 r4:85573c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85573c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 r5:854f638c r4:854f6000 r4:852f1980 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b2280 INFO: task kworker/1:824:5328 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9294d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5329 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85574800 r5:85574800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Call trace: r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 92c85000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85575400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:5333 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:85576000 r4:85576000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85576000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b2840 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85576000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f6b8c r4:854f6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:827:5333 is blocked on a mutex likely owned by task kworker/1:208:3660. Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 93065000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:828:5336 blocked for more than 469 seconds. r4:85576c00 r5:85576c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/1:829:5337 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5337 tgid:5337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:85538000 r4:85538000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85538000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85538000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb211000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f7f8c r4:854f7c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f7f8c r4:852f1e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85538000 r8:852f1eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852f1e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852f1e80 r8:8027ecf4 r7:eb9ade60 r6:852f1f00 r5:85538000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847b29c0 INFO: task kworker/1:829:5337 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 93490000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85539800 r8:8506e9ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:276:5343 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:5343 tgid:5343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb761d84 r8:00000002 r7:60000013 r6:eb761d8c r5:85538c00 r4:85538c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85538c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84797b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85538c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0815000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fc78c r4:854fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fc78c r4:8506ea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85538c00 r8:8506ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506ea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ea00 r8:8027ecf4 r7:eb945e60 r6:8510a000 r5:85538c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84797640 INFO: task kworker/0:276:5343 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 936d9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/1:830:5345 blocked for more than 469 seconds. r5:8553bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8553bc00 r8:8510a0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5346 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5346 tgid:5346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:8553c800 r4:8553c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8553c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8553c800 r8:8510a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:277 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8553a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84797500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8553a400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fd78c r4:854fd400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fd78c r4:8506ea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8553a400 r8:8506eaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506ea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ea80 r8:8027ecf4 r7:eb761e60 r6:8510a280 r5:8553a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d5fb0 to 0xeb9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84797900 INFO: task kworker/0:277:5348 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 93c25000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:eb9d9d84 r8:00000002 r7:60000013 r6:eb9d9d8c r5:8553b000 r5:8553b000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:854fcb8c r4:8506eb00 9fa0: 00000000 00000000 00000000 00000000 Call trace: r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8553d400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84797e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8553d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac47000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fcf8c r4:854fcc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fcf8c r4:8506eb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8553d400 r8:8506ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506eb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506eb80 r8:8027ecf4 r7:eb9d5e60 r6:8510a380 r5:8553d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84797a00 INFO: task kworker/0:279:5351 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 94234000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:280 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8553e000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8553e000 r8:8506ec2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:5355 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:5355 tgid:5355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9f1d84 r8:00000002 r7:60000113 r6:eb9f1d8c r5:85578c00 r4:85578c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85578c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847970c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85578c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fdb8c r4:854fd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fdb8c r4:8506ec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85578c00 r8:8506ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8506ec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ec80 r8:8027ecf4 r7:eb9d5e60 r6:8510a480 r5:85578c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:eb9fdd84 r8:00000002 r7:60000113 r6:eb9fdd8c r5:85579800 r5:85579800 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:854fe78c r4:854fe400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fe78c r4:8506ed00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85579800 r8:8506ed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8506ed00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8506ed00 r8:8027ecf4 r7:eb9f1e60 r6:8510a500 r5:85579800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84797fc0 INFO: task kworker/0:282:5358 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 948d4000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/0:283 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8557b000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b2ac0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:284:5361 blocked for more than 469 seconds. r4:83b5e000 r5:83b5e000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 94daf000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5363 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5363 tgid:5363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba0dd84 r8:00000002 r7:60000113 r6:eba0dd8c r5:83b58c00 r4:83b58c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b58c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85191680 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:832:5363 is blocked on a mutex likely owned by task kworker/1:208:3660. [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:833:5366 blocked for more than 470 seconds. r5:83b5bc00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 950f2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:834:5368 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:834 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba19d84 r8:00000002 r7:60000113 r6:eba19d8c r5:83b5d400 r4:83b5d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83b5d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:e0451dc0 r5:00001000 r4:ee619000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:285 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8557a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473f800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8557a400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fef8c r4:854fec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854fef8c r4:83c15000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557a400 r8:83c1502c r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15000 r8:8027ecf4 r7:eb9fde60 r6:8510a800 r5:8557a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473f300 INFO: task kworker/0:285:5370 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9579e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8557bc00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:83c15080 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: 959f6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba29d84 r8:00000002 r7:60000013 r6:eba29d8c r5:8557c800 r4:8557c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8557c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473f900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8557c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb639000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ff38c r4:854ff000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ff38c r4:83c15100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557c800 r8:83c1512c r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15100 r8:8027ecf4 r7:eba01e60 r6:8510a900 r5:8557c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473f680 INFO: task kworker/0:287:5375 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 1d20: 95cf2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8557ec00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8557ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb651000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ff78c r4:854ff400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854ff78c r4:83c15180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557ec00 r8:83c151ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15180 r8:8027ecf4 r7:eba29e60 r6:8510a980 r5:8557ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473f700 INFO: task kworker/0:288:5376 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 95f83000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) task:kworker/0:289 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8553ec00 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473f140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8553ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6fb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc78c r4:855fc400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855fc78c r4:83c15200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8553ec00 r8:83c1522c r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15200 r8:8027ecf4 r7:eba2de60 r6:8510aa00 r5:8553ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473f700 INFO: task kworker/0:289:5378 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9624a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8557e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:8473f880 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85540000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:83c15300 r8:8027ecf4 r7:eba35e60 r6:8510ab00 r5:85540000 INFO: task kworker/0:291:5381 is blocked on a mutex likely owned by task kworker/1:208:3660. [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee619000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85542400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8473fe40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85542400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fc38c r4:855fc000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855fc38c r4:83c15380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85542400 r8:83c153ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15380 r8:8027ecf4 r7:eba35e60 r6:8510ab80 r5:85542400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473fb80 INFO: task kworker/0:292:5384 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 96916000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85540c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:83c15400 r8:8027ecf4 r7:eba35e60 r6:8510ac00 r5:85540c00 INFO: task kworker/0:293:5385 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:294:5387 blocked for more than 470 seconds. r5:85543000 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fd38c r4:855fd000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855fd38c r4:83c15480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85543000 r8:83c154ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15480 r8:8027ecf4 r7:eba51e60 r6:8510ac80 r5:85543000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8473fdc0 INFO: task kworker/0:294:5387 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 96dfe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:295:5389 blocked for more than 470 seconds. r5:85543c00 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5391 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba59d84 r8:00000002 r7:60000113 r6:eba59d8c r5:85544800 r4:85544800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85544800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:855fdf8c r4:8510ad80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r5:85545400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:855fd78c r4:855fd400 r4:83c15580 1fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 97b14000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:5396 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba6dd84 r8:00000002 r7:60000113 r6:eba6dd8c r5:85546000 r4:85546000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85546000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85191600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85546000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855fdb8c r4:855fd800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85546000 r8:83c1562c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:5398 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85546c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:83b5ec00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83b5ec00 r8:83c1572c r7:82804d40 r6:dddced40 r5:dddced60 r4:83c15700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83c15700 r8:8027ecf4 r7:eba7de60 r6:83c15780 r5:83b5ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85191480 INFO: task kworker/0:299:5399 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 98294000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5402 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5402 tgid:5402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:85508000 r4:85508000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85508000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847e66c0 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:85509800 r4:85509800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85509800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe59000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558cb8c r4:8558c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8558cb8c r4:8504d080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85509800 r8:8504d0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d080 r8:8027ecf4 r7:eba0de60 r6:83c15880 r5:85509800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e66c0 INFO: task kworker/1:837:5404 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 98577000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:5406 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:8550a400 r4:8550a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8550b000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558cf8c r4:8558cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8558cf8c r4:8504d180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550b000 r8:8504d1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d180 r8:8027ecf4 r7:eba0de60 r6:83c15a80 r5:8550b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e6b80 INFO: task kworker/1:838:5409 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 98a2b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:5411 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:5411 tgid:5411 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8550bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:83c15b00 r8:8027ecf4 r7:eba9de60 r6:83c15b80 r5:8550bc00 r4:85191d80 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:839:5412 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:839 state:D stack:0 pid:5412 tgid:5412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9c1d84 r8:00000002 r7:60000013 r6:eb9c1d8c r5:8550c800 r4:8550c800 r5:8550c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6cc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8959000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558d38c r4:8558d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8558d38c r4:8504d100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550c800 r8:8504d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d100 r8:8027ecf4 r7:eba0de60 r6:83c15c00 r5:8550c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8550ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8550d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e6f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558db8c r4:8558d800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8558db8c r4:8504d280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550d400 r8:8504d2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d280 r8:8027ecf4 r7:eba0de60 r6:83c15d00 r5:8550d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e6c80 INFO: task kworker/1:841:5416 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 992ac000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:83b5c800 r5:83b5c800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r9:83018205 r8:83b5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:8504d300 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85191640 INFO: task kworker/1:842:5418 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 99342000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:843:5420 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:843 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85508c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r5:00001000 r4:eb15d000 r10:61c88647 r9:85508c00 r8:8504d3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:844 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85518000 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8504d400 r8:8027ecf4 r7:ebac5e60 r6:83c15e80 r5:85518000 r4:8473dd80 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 99aa7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5424 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5424 tgid:5424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebad5d84 r8:00000002 r7:60000113 r6:ebad5d8c r5:85519800 r4:85519800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85519800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85519800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb829000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559638c r4:85596000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559638c r4:8504d480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85519800 r8:8504d4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d480 r8:8027ecf4 r7:ebac5e60 r6:83c15f00 r5:85519800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:846:5426 blocked for more than 470 seconds. r10:829189c0 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:85518c00 r5:85518c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb389000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558ef8c r4:8558ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8558ef8c r4:8504d580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85518c00 r8:8504d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d580 r8:8027ecf4 r7:ebad5e60 r6:83c15f80 r5:85518c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855bd100 INFO: task kworker/1:846:5426 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9a082000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:847:5428 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:847 state:D stack:0 pid:5428 tgid:5428 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebae5d84 r8:00000002 r7:60000113 r6:ebae5d8c r5:8551a400 r4:8551a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd300 r5:8558f38c r4:8558f000 r10:61c88647 r9:8551a400 r8:8504d52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80070013 ffffffff r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:848 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8551b000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd480 r7:ddde2d40 r6:83018200 r5:8558f78c r4:8504d600 Exception stack(0xebaedfb0 to 0xebaedff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:849:5432 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:849 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:8551bc00 r4:8551bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8558fb8c r4:8558f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8558fb8c r4:8504d680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551bc00 r8:8504d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d680 r8:8027ecf4 r7:ebad5e60 r6:855c0080 r5:8551bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855bd280 INFO: task kworker/1:849:5432 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9a88d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8551e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb489000 r7:ddde2d40 r6:83018200 r5:8558ff8c r4:8504d700 r4:00000001 r4:855bd380 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bb0 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5436 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5436 tgid:5436 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:8551d400 r4:8551d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bd800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551d400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84330f8c r4:84330c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84330f8c r4:8504d780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551d400 r8:8504d7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8551c800 r4:829189bc r4:00000000 r4:00000000 r5:00001000 r4:eb4e3000 r10:61c88647 r9:8551c800 r8:8504d82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9ac9a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:5440 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:5440 tgid:5440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:8550e000 r4:8550e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8550e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8550e000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb503000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559478c r4:85594400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559478c r4:8504d880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8550e000 r8:8504d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d880 r8:8027ecf4 r7:ebad5e60 r6:855c0280 r5:8550e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855bd700 INFO: task kworker/1:853:5440 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9af45000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5442 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb1dd84 r8:00000002 r7:60000013 r6:ebb1dd8c r5:84a16000 r4:84a16000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a16000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdb80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a16000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85594b8c r4:85594800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85594b8c r4:8504d900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a16000 r8:8504d92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504d900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504d900 r8:8027ecf4 r7:ebad5e60 r6:855c0300 r5:84a16000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855bda40 INFO: task kworker/1:854:5442 is blocked on a mutex likely owned by task kworker/1:208:3660. Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:855 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85520c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r7:ddde2d40 r6:83018200 r5:85594f8c r4:8504d980 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:829189c0 r9:ebb2dd84 r8:00000002 r7:60000013 r6:ebb2dd8c r5:85522400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bde00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85522400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559538c r4:85595000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559538c r4:8504da00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85522400 r8:8504da2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504da00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504da00 r8:8027ecf4 r7:ebad5e60 r6:855c0400 r5:85522400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855bdd40 INFO: task kworker/1:856:5446 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9b5b5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r4:82ac11e4 r4:00000000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8557d400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559578c r4:85595400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559578c r4:8504da80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557d400 r8:8504daac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8504da80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504da80 r8:8027ecf4 r7:ebad5e60 r6:8504db00 r5:8557d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855bdc00 INFO: task kworker/1:857:5448 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d60: 80070013 ffffffff r4:00000000 r4:847a6c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85510000 r4:829189bc r4:00000000 r5:8562c78c r4:8562c400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85511800 r4:829189bc r9:83018205 r8:85511800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r4:8504dc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8504dc00 r8:8027ecf4 r7:ebad5e60 r6:8504dc80 r5:85511800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ce180 INFO: task kworker/1:858:5453 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9b893000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:00000000 r4:847a6c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85510c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xebb3dfb0 to 0xebb3dff8) Exception stack(0xe0451d20 to 0xe0451d68) r5:00001000 r4:ee619000 Exception stack(0xe0451fb0 to 0xe0451ff8) r4:85513000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r5:855fff8c r4:855ffc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855fff8c r4:855c0500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85513000 r8:855c052c r7:82804d40 r6:dddced40 r5:dddced60 r4:855c0500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0500 r8:8027ecf4 r7:ebb35e60 r6:8504de00 r5:85513000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cf000 INFO: task kworker/0:303:5456 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9bf00000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:847a6c80 INFO: task kworker/1:860:5458 blocked for more than 471 seconds. r5:85513c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ce7c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb817000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85595f8c r4:85595c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:860:5458 is blocked on a mutex likely owned by task kworker/1:208:3660. r4:e0451dc0 r5:8495ab8c r4:8495a800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:85514800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ced40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85596f8c r4:8504df80 Exception stack(0xeba15fb0 to 0xeba15ff8) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0451fb0 to 0xe0451ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:85515400 r4:85515400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85515400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ceb00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85515400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb841000 r10:61c88647 r9:85515400 r8:855d00ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r5:8495ab8c r4:8495a800 1fa0: 00000000 00000000 00000000 00000000 r4:85516000 r5:85516000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cec00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85516000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb857000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85596b8c r4:85596800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85596b8c r4:855d0180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85516000 r8:855d01ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0180 r8:8027ecf4 r7:eba15e60 r6:855d0200 r5:85516000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cea00 INFO: task kworker/1:863:5465 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9c7f7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:864 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85516c00 r5:85516c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85516c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559778c r4:85597400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559778c r4:855d0280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85516c00 r8:855d02ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0280 r8:8027ecf4 r7:eba15e60 r6:855d0300 r5:85516c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cebc0 INFO: task kworker/1:864:5467 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9c7f7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:865:5468 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:865 state:D stack:0 pid:5468 tgid:5468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb49d84 r8:00000002 r7:60000013 r6:ebb49d8c r5:85512400 r4:85512400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85512400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cef40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85512400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559738c r4:85597000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8559738c r4:855d0380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85512400 r8:855d03ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0380 r8:8027ecf4 r7:ebb4de60 r6:855d0400 r5:85512400 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85578000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:855a0f8c r4:855d0480 r10:61c88647 r9:85578000 r8:855d04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0480 r8:8027ecf4 r7:ebb4de60 r6:855d0500 r5:85578000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cef00 INFO: task kworker/1:866:5471 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9ce2e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:867:5472 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:867 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb59d84 r8:00000002 r7:60000013 r6:ebb59d8c r5:85528000 r4:85528000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85528000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85597b8c r4:85597800 r7:ddde2d40 r6:83018200 r5:85597b8c r4:855d0580 r10:00000000 r9:855d0580 r8:8027ecf4 r7:ebb51e60 r6:855d0600 r5:85528000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9d22b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:868:5474 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:868 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb65d84 r8:00000002 r7:60000113 r6:ebb65d8c r5:85523c00 r4:85523c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85523c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855d0680 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85523000 r4:829189bc r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85597f8c r4:85597c00 r4:855c0600 Exception stack(0xebb7dfb0 to 0xebb7dff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:5478 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:85524800 r4:85524800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85524800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cfbc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85524800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a078c r4:855a0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a078c r4:855c0700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85524800 r8:855c072c r7:82804d40 r6:dddced40 r5:dddced60 r4:855c0700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0700 r8:8027ecf4 r7:ebb35e60 r6:855c0780 r5:85524800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cf8c0 INFO: task kworker/0:305:5478 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9d64b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/1:869:5482 blocked for more than 471 seconds. r4:85525400 r5:85525400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:855d0700 r8:8027ecf4 r7:ebb51e60 r6:855c0800 r5:85525400 r4:855d7880 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:5484 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb729d84 r8:00000002 r7:60000113 r6:eb729d8c r5:85526c00 r4:85526c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85526c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e5ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85526c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562cb8c r4:8562c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562cb8c r4:855c0880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526c00 r8:855c08ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855c0880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0880 r8:8027ecf4 r7:ebb79e60 r6:855c0900 r5:85526c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cfcc0 INFO: task kworker/0:306:5484 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9df32000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:307:5485 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r5:85520000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856939c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85520000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb549000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562df8c r4:8562dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562df8c r4:855c0980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85520000 r8:855c09ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855c0980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855c0980 r8:8027ecf4 r7:eb729e60 r6:855c0a00 r5:85520000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cfcc0 INFO: task kworker/0:307:5485 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9df32000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:870:5489 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85600000 r5:85600000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7f00 r5:855a1b8c r4:855a1800 r10:00000000 r9:855d0780 r8:8027ecf4 r7:ebb51e60 r6:855c0a80 r5:85600000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:871:5491 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:871 state:D stack:0 pid:5491 tgid:5491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebaa9d84 r8:00000002 r7:60000113 r6:ebaa9d8c r5:85601800 r5:85601800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7c80 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85601800 r8:855d082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:85602400 r5:85602400 r4:829189bc r4:00000000 r9:83018205 r8:85602400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r7:ddde2d40 r6:83018200 r5:855a178c r4:855d0880 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:855d7c40 INFO: task kworker/1:872:5492 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9e776000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:873:5494 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:873 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebb9dd84 r8:00000002 r7:60000113 r6:ebb9dd8c r5:85600c00 r4:85600c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85600c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855cff00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85600c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb265000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a2b8c r4:855a2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a2b8c r4:855d0900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85600c00 r8:855d092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0900 r10:00000000 r9:855d0900 r8:8027ecf4 r7:eba8de60 r6:855c0c00 r5:85600c00 INFO: task kworker/1:873:5494 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:874 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85603c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb091000 r7:ddde2d40 r6:83018200 r5:855a1f8c r4:855d0980 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:875:5497 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:875 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:85603000 r4:85603000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85603000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85603000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a238c r4:855a2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a238c r4:855d0a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85603000 r8:855d0a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0a00 r8:8027ecf4 r7:ebb9de60 r6:855c0d00 r5:85603000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d7e80 INFO: task kworker/1:875:5497 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9f4eb000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5499 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbb1d84 r8:00000002 r7:60000113 r6:ebbb1d8c r5:85606000 r4:85606000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85606000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d7700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85606000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb215000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a278c r4:855a2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a278c r4:855d0a80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85606000 r8:855d0aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0a80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0a80 r8:8027ecf4 r7:ebb9de60 r6:855c0d80 r5:85606000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d7280 INFO: task kworker/1:876:5499 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9f4eb000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r5:8495ab8c r4:8495a800 r4:847a6c80 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:877:5501 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:877 state:D stack:0 pid:5501 tgid:5501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:85605400 r4:85605400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85605400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85605400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb731000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a478c r4:855a4400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a478c r4:855d0b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85605400 r8:855d0bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0b80 r8:8027ecf4 r7:ebb9de60 r6:855c0e00 r5:85605400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb9fb0 to 0xebbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855cff40 INFO: task kworker/1:877:5501 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r5:00001000 r4:ee619000 r4:847a6c80 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:878:5503 blocked for more than 471 seconds. r5:85604800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eb580 r7:ddde2d40 r6:83018200 r5:855a2f8c r4:855d0b00 Exception stack(0xebbc1fb0 to 0xebbc1ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85606c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bdc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85606c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb377000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a338c r4:855a3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a338c r4:855d0c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85606c00 r8:855d0c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0c00 r8:8027ecf4 r7:ebbb9e60 r6:855c0f00 r5:85606c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc9fb0 to 0xebbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847eb0c0 INFO: task kworker/1:879:5505 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9fae5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:880:5508 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:880 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbd5d84 r8:00000002 r7:60000113 r6:ebbd5d8c r5:8551ec00 r4:8551ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8551ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb56f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a378c r4:855a3400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a378c r4:855d0c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8551ec00 r8:855d0cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebbd5fb0 to 0xebbd5ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 task:kworker/1:881 state:D stack:0 pid:5509 tgid:5509 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85526000 r4:829189bc r4:00000000 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb653000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a3b8c r4:855a3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a3b8c r4:855d0d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85526000 r8:855d0d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0d00 r8:8027ecf4 r7:ebbb9e60 r6:855f3000 r5:85526000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd9fb0 to 0xebbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ec040 INFO: task kworker/1:881:5509 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: 9ffdc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:882:5511 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r5:85530c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5513 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbe9d84 r8:00000002 r7:60000013 r6:ebbe9d8c r5:85530000 r4:85530000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85530000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ec540 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85530000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a438c r4:855a4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a438c r4:855d0e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85530000 r8:855d0e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855d0e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855d0e00 r8:8027ecf4 r7:ebbb9e60 r6:855f3100 r5:85530000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe9fb0 to 0xebbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855ec480 INFO: task kworker/1:883:5513 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a039b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:884:5516 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:884 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eb9f5d84 r8:00000002 r7:60000113 r6:eb9f5d8c r5:85532400 r5:85532400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85532400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 r10:61c88647 r9:85532400 r8:855d0eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a05b8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Call trace: r5:85533000 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8562cf8c r4:8562cc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bb0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84789140 r5:85533c00 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:85533c00 r8:855f332c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:885:5522 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:885 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbf5d84 r8:00000002 r7:60000013 r6:ebbf5d8c r5:85535400 r4:85535400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85535400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 r4:00000000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebbf5fb0 to 0xebbf5ff8) Workqueue: events bpf_prog_free_deferred [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:00000000 r9:855d0f80 r8:8027ecf4 r7:eb9f5e60 r6:855f3480 r5:85534800 Workqueue: events bpf_prog_free_deferred r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85536c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ece00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebc01fb0 to 0xebc01ff8) r4:855ec880 Call trace: 1d20: a0f39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:888:5527 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:888 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc09d84 r8:00000002 r7:60000113 r6:ebc09d8c r5:85536000 r4:85536000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85536000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5529 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5529 tgid:5529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc11d84 r8:00000002 r7:60000113 r6:ebc11d8c r5:85531800 r4:85531800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85531800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ecf00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85531800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a5f8c r4:855a5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a5f8c r4:855f0100 r10:61c88647 r9:85531800 r8:855f012c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a12a7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: r5:84aa8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:84aa8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0451dc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:5533 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84aaa400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc21e08 r5:855a638c r4:855a6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a638c r4:855f0200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aaa400 r8:855f022c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0200 r8:8027ecf4 r7:ebc19e60 r6:855f3700 r5:84aaa400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc21fb0 to 0xebc21ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:855ecd00 1d20: a1ae4000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r5:8495ab8c r4:8495a800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84aa9800 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84aa9800 r8:855f02ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0280 r8:8027ecf4 r7:ebc19e60 r6:855f3780 r5:84aa9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb91fb0 to 0xebb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5536 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8552b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462040 r10:61c88647 r9:8552b000 r8:855f032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:894:5541 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:894 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:8552bc00 r4:829189bc r4:00000000 r10:00000000 r9:855f0400 r8:8027ecf4 r7:ebc19e60 r6:855f0480 r5:8552bc00 1d20: a25e4000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r5:8495ab8c r4:8495a800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8552c800 r4:829189bc [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8552c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf87000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a778c r4:855a7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855a778c r4:855f0500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552c800 r8:855f052c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0500 r8:8027ecf4 r7:eba21e60 r6:855f0580 r5:8552c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462240 INFO: task kworker/1:895:5542 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8552d400 r5:8552d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc2de08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:8552d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8552d400 r8:855f062c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462440 INFO: task kworker/1:896:5545 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a2bf2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5546 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:897 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc31d84 r8:00000002 r7:60000013 r6:ebc31d8c r5:8552e000 r4:8552e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8552e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854626c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8552e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84789140 r4:8552ec00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854629c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8552ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb40b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ac38c r4:855ac000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ac38c r4:855f0800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552ec00 r8:855f082c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0800 r8:8027ecf4 r7:ebc2de60 r6:855f0880 r5:8552ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462980 INFO: task kworker/1:898:5549 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a2bf2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5550 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc25d84 r8:00000002 r7:60000113 r6:ebc25d8c r5:85529800 r4:85529800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85529800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85529800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ac78c r4:855ac400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ac78c r4:855f0900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85529800 r8:855f092c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0900 r8:8027ecf4 r7:ebc39e60 r6:855f0980 r5:85529800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462a40 INFO: task kworker/1:899:5550 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:900:5552 blocked for more than 472 seconds. task:kworker/1:900 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8552a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018205 r8:8552a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r4:00000001 Exception stack(0xebc3dfb0 to 0xebc3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5554 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5554 tgid:5554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc41d84 r8:00000002 r7:60000113 r6:ebc41d8c r5:85528c00 r4:85528c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85528c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85528c00 r8:855f0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: a40a1000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:902:5556 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:902 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc4dd84 r8:00000002 r7:60000013 r6:ebc4dd8c r5:84aad400 r4:84aad400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84aad400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ecfc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aad400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ad38c r4:855ad000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ad38c r4:855f0c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aad400 r8:855f0c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0c00 r8:8027ecf4 r7:ebc3de60 r6:855f3800 r5:84aad400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc4dfb0 to 0xebc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85462d00 INFO: task kworker/1:902:5556 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a4849000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r4:82ac11e4 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:903 state:D stack:0 pid:5558 tgid:5558 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84aac800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:84aac800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:904:5559 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:904 state:D stack:0 pid:5559 tgid:5559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc45d84 r8:00000002 r7:60000013 r6:ebc45d8c r5:85541800 r4:85541800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85541800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85541800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb519000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ad78c r4:855ad400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ad78c r4:855f0d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r5:85608000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:855f0e00 r4:85210040 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5564 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5564 tgid:5564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:85608c00 r4:85608c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85608c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852105c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85608c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85608c00 r8:855f0f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f0f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0f00 r8:8027ecf4 r7:ebc51e60 r6:855f0f80 r5:85608c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852102c0 INFO: task kworker/1:906:5564 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:e0451dc0 r5:8495ab8c r4:8495a800 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84aabc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc71e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:855ae38c r4:852eb000 Workqueue: events bpf_prog_free_deferred [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5568 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc7dd84 r8:00000002 r7:60000113 r6:ebc7dd8c r5:84aaec00 r4:84aaec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84aaec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210b00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aaec00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb849000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855af78c r4:855af400 r7:ddde2d40 r6:83018200 r5:855af78c r4:852eb080 r4:852eb080 Exception stack(0xebc7dfb0 to 0xebc7dff8) 1d20: a5384000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 r5:84aab000 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210740 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a5b46000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5571 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:910 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc89d84 r8:00000002 r7:60000013 r6:ebc89d8c r5:85521800 r4:85521800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85521800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210840 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:855aef8c r4:852eb180 r4:852eb180 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:911:5573 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:911 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc6dd84 r8:00000002 r7:60000113 r6:ebc6dd8c r5:85609800 r4:85609800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85609800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc6de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852109c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852eb200 r8:8027ecf4 r7:ebc7de60 r6:852eb280 r5:85609800 r4:85210600 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a5e03000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5576 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8560a400 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc8dfb0 to 0xebc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85210a40 INFO: task kworker/1:912:5576 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a6476000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r5:80070013 r4:80239bb0 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:913:5578 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:8560b000 r5:8560b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852eb400 r8:8027ecf4 r7:ebc8de60 r6:852eb480 r5:8560b000 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85210a80 INFO: task kworker/1:913:5578 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a6476000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5579 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc99d84 r8:00000002 r7:60000113 r6:ebc99d8c r5:8560bc00 r4:8560bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85210dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855aff8c r4:855afc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855aff8c r4:852eb500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560bc00 r8:852eb52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852eb500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eb500 r8:8027ecf4 r7:ebc8de60 r6:852eb580 r5:8560bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85210a80 INFO: task kworker/1:914:5579 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a6476000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:5582 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8560c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:855b878c r4:852eb600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560c800 r8:852eb62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852eb600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eb600 r8:8027ecf4 r7:ebc8de60 r6:852eb680 r5:8560c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc9dfb0 to 0xebc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85210ec0 INFO: task kworker/1:915:5582 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a6476000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:916:5584 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebca1d84 r8:00000002 r7:60000113 r6:ebca1d8c r5:8560d400 r4:8560d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85696040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b8b8c r4:855b8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b8b8c r4:852eb700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560d400 r8:852eb72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852eb700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eb700 r8:8027ecf4 r7:ebc9de60 r6:852eb780 r5:8560d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca1fb0 to 0xebca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85696080 INFO: task kworker/1:916:5584 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a69b5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5586 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:5586 tgid:5586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebca5d84 r8:00000002 r7:60000113 r6:ebca5d8c r5:8560e000 r4:8560e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85696680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560e000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b978c r4:855b9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b978c r4:852eb800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560e000 r8:852eb82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852eb800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eb800 r8:8027ecf4 r7:ebca1e60 r6:852eb880 r5:8560e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca5fb0 to 0xebca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85696080 INFO: task kworker/1:917:5586 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a69b5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5588 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebca9d84 r8:00000002 r7:60000113 r6:ebca9d8c r5:8560ec00 r4:8560ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8560ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856963c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8560ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebab9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b8f8c r4:855b8c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b8f8c r4:852eb900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8560ec00 r8:852eb92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852eb900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eb900 r8:8027ecf4 r7:ebca5e60 r6:852eb980 r5:8560ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85696240 INFO: task kworker/1:918:5588 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a6c2a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5589 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5589 tgid:5589 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcadd84 r8:00000002 r7:60000113 r6:ebcadd8c r5:85610000 r4:85610000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85610000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856964c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85610000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b938c r4:855b9000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b938c r4:852eba00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610000 r8:852eba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852eba00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eba00 r8:8027ecf4 r7:ebca5e60 r6:852eba80 r5:85610000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85696240 INFO: task kworker/1:919:5589 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a6fb5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:5591 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:920 state:D stack:0 pid:5591 tgid:5591 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc49d84 r8:00000002 r7:60000113 r6:ebc49d8c r5:85611800 r4:85611800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85611800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85696bc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85611800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb09000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b9f8c r4:855b9c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b9f8c r4:852ebb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85611800 r8:852ebb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ebb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ebb00 r8:8027ecf4 r7:ebca5e60 r6:852ebb80 r5:85611800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc49fb0 to 0xebc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85696640 INFO: task kworker/1:920:5591 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a789b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:5594 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:5594 tgid:5594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcb9d84 r8:00000002 r7:60000113 r6:ebcb9d8c r5:85610c00 r4:85610c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85610c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85696a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85610c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b9b8c r4:855b9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b9b8c r4:852ebc00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610c00 r8:852ebc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ebc00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ebc00 r8:8027ecf4 r7:ebc49e60 r6:852ebc80 r5:85610c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb9fb0 to 0xebcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856965c0 INFO: task kworker/1:921:5594 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a789b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85612400 r5:85612400 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a7b2d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5599 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:923 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcbdd84 r8:00000002 r7:60000113 r6:ebcbdd8c r5:85613c00 r4:85613c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:923:5599 is blocked on a mutex likely owned by task kworker/1:208:3660. r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:924:5600 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:924 state:D stack:0 pid:5600 tgid:5600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcc1d84 r8:00000002 r7:60000113 r6:ebcc1d8c r5:85613000 r4:85613000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85613000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85696f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ba78c r4:855ba400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ba78c r4:852ebf00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613000 r8:852ebf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ebf00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ebf00 r8:8027ecf4 r7:ebcb5e60 r6:852ebf80 r5:85613000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc1fb0 to 0xebcc1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85614800 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:926 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855baf8c r4:855bac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855baf8c r4:85698100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85615400 r8:8569812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698100 r8:8027ecf4 r7:ebcb5e60 r6:85698180 r5:85615400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc5fb0 to 0xebcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856a0080 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:927 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:856a0240 1d60: 80070013 ffffffff r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85616c00 r4:829189bc r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:855bbf8c r4:85698300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616c00 r8:8569832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698300 r8:8027ecf4 r7:ebcb5e60 r6:85698380 r5:85616c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856a0400 INFO: task kworker/1:928:5610 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: a89cf000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000001 INFO: task kworker/1:929:5612 blocked for more than 472 seconds. r5:85618000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0600 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:85618c00 r4:85618c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85618c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85618c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e078c r4:856e0400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e078c r4:85698500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85618c00 r8:8569852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698500 r8:8027ecf4 r7:eba69e60 r6:85698580 r5:85618c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:847a6c80 r4:84789140 Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85619800 r4:85619800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85619800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0840 r4:00000000 r5:856e038c r4:856e0000 r4:85698600 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:00001000 r4:ee619000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:8561a400 r4:829189bc r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0bc0 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1d60: 80070013 ffffffff r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:5620 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebccdd84 r8:00000002 r7:60000113 r6:ebccdd8c r5:8561b000 r4:8561b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561b000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e0f8c r4:856e0c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:856a0a40 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80070013 ffffffff r4:82ac11e4 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:934:5622 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcd9d84 r8:00000002 r7:60000013 r6:ebcd9d8c r5:8561bc00 r4:8561bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a0dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e138c r4:856e1000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e138c r4:85698900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561bc00 r8:8569892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698900 r8:8027ecf4 r7:ebccde60 r6:85698980 r5:8561bc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd9fb0 to 0xebcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856a0b40 INFO: task kworker/1:934:5622 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: aa4c7000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:5623 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:5623 tgid:5623 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcc9d84 r8:00000002 r7:60000113 r6:ebcc9d8c r5:8561d400 r4:8561d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b2480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e1b8c r4:856e1800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e1b8c r4:85698a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561d400 r8:85698a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698a00 r8:8027ecf4 r7:ebcd9e60 r6:85698a80 r5:8561d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc9fb0 to 0xebcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856a0cc0 INFO: task kworker/1:935:5623 is blocked on a mutex likely owned by task kworker/1:208:3660. [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:310 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8561e000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf6c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8561e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562e78c r4:8562e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562e78c r4:855f3b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561e000 r8:855f3b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855f3b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f3b00 r8:8027ecf4 r7:eb9f9e60 r6:85698b00 r5:8561e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85693f40 INFO: task kworker/0:310:5627 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: aab32000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:936 state:D stack:0 pid:5628 tgid:5628 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8561c800 r5:8561c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8561c800 r8:85698bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698b80 r8:8027ecf4 r7:ebcc9e60 r6:85698c00 r5:8561c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8476df80 INFO: task kworker/1:936:5628 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ab133000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:5629 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcddd84 r8:00000002 r7:60000113 r6:ebcddd8c r5:85659800 r4:85659800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85659800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bfd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85659800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562e38c r4:8562e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562e38c r4:855f3b80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85659800 r8:855f3bac r7:82804d40 r6:dddced40 r5:dddced60 r4:855f3b80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f3b80 r8:8027ecf4 r7:ebcede60 r6:855f3c00 r5:85659800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85693f40 INFO: task kworker/0:311:5629 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ab359000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:937:5632 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:937 state:D stack:0 pid:5632 tgid:5632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:8565bc00 r4:8565bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b2580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8565bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e1f8c r4:856e1c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e1f8c r4:85698c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85698c80 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b2280 INFO: task kworker/1:937:5632 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ab964000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:938:5635 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:938 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd05d84 r8:00000002 r7:60000113 r6:ebd05d8c r5:8565d400 r4:8565d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b26c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8565d400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb725000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e238c r4:856e2000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e238c r4:85698d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565d400 r8:85698d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698d00 r8:8027ecf4 r7:ebcf5e60 r6:855f3d00 r5:8565d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd05fb0 to 0xebd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b2380 INFO: task kworker/1:938:5635 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: abda5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:939:5637 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:939 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd0dd84 r8:00000002 r7:60000013 r6:ebd0dd8c r5:8565c800 r4:8565c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd0de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b2800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8565c800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e278c r4:856e2400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e278c r4:85698d80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565c800 r8:85698dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698d80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698d80 r8:8027ecf4 r7:ebd05e60 r6:855f3d80 r5:8565c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd0dfb0 to 0xebd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b2540 INFO: task kworker/1:939:5637 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: abda5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:5638 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd11d84 r8:00000002 r7:60000113 r6:ebd11d8c r5:8565ec00 r4:8565ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e2b8c r4:856e2800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e2b8c r4:85698e00 r10:00000000 r9:85698e00 r8:8027ecf4 r7:ebd0de60 r6:855f3e00 r5:8565ec00 Exception stack(0xe0451d20 to 0xe0451d68) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8565a400 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fa0: 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8565e000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e2f8c r4:856e2c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e2f8c r4:85698f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565e000 r8:85698f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698f00 r8:8027ecf4 r7:ebd19e60 r6:855f3f00 r5:8565e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd1dfb0 to 0xebd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b2a00 INFO: task kworker/1:942:5641 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 Exception stack(0xe0451d20 to 0xe0451d68) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0451dc0 r4:00000000 r5:00001000 r4:ee619000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:943:5643 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:943 state:D stack:0 pid:5643 tgid:5643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd25d84 r8:00000002 r7:60000113 r6:ebd25d8c r5:8565b000 r4:8565b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b2b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8565b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba07000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e338c r4:856e3000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e338c r4:85698f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565b000 r8:85698fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85698f80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85698f80 r8:8027ecf4 r7:ebd19e60 r6:855f3f80 r5:8565b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd25fb0 to 0xebd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b2bc0 INFO: task kworker/1:943:5643 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ac777000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:5645 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd2dd84 r8:00000002 r7:60000013 r6:ebd2dd8c r5:84aae000 r4:84aae000 r5:84aae000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856e378c r4:856e3400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b29c0 INFO: task kworker/1:944:5645 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: acbb2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:945 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85718c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b2e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85718c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856e3b8c r4:856e3800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856e3b8c r4:856bd080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85718c00 r8:856bd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd080 r8:8027ecf4 r7:ebd19e60 r6:856bd100 r5:85718c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856b2c00 INFO: task kworker/1:945:5647 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d60: 80070013 ffffffff r4:00000000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:946:5650 blocked for more than 473 seconds. r5:85719800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:947:5651 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:947 state:D stack:0 pid:5651 tgid:5651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebce1d84 r8:00000002 r7:60000013 r6:ebce1d8c r5:8571a400 r4:8571a400 r5:8571a400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:85693580 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:847a6c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r5:8571b000 r4:829189bc r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84789140 Workqueue: events bpf_prog_free_deferred r5:8571bc00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 r4:e0451dc0 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:950:5658 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:950 state:D stack:0 pid:5658 tgid:5658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd55d84 r8:00000002 r7:60000013 r6:ebd55d8c r5:85658c00 r4:85658c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85658c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd55e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c7c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85658c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:00000001 INFO: task kworker/1:951:5660 blocked for more than 473 seconds. r5:844c0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd5de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c75c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ed38c r4:856ed000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ed38c r4:856bd600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c0000 r8:856bd62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd600 r8:8027ecf4 r7:ebd55e60 r6:856c4100 r5:844c0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd5dfb0 to 0xebd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856c7500 INFO: task kworker/1:951:5660 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:844c0c00 r4:829189bc r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856ed78c r4:856ed400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ed78c r4:856bd680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c0c00 r8:856bd6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd680 r8:8027ecf4 r7:ebd55e60 r6:856c4180 r5:844c0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd61fb0 to 0xebd61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856c73c0 INFO: task kworker/1:952:5661 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ae2d9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 r5:8495ab8c r4:8495a800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:844c2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:856bd700 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:844c4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c79c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856edf8c r4:856edc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856edf8c r4:856bd780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c4800 r8:856bd7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd780 r8:8027ecf4 r7:ebd55e60 r6:856c4280 r5:844c4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856c76c0 INFO: task kworker/1:954:5666 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: aea6f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:955:5667 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:955 state:D stack:0 pid:5667 tgid:5667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:844c3000 r5:844c3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:856bd800 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:844c3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c7d40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ad000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856eeb8c r4:856ee800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856eeb8c r4:856bd880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c3c00 r8:856bd8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd880 r8:8027ecf4 r7:ebd55e60 r6:856c4380 r5:844c3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b5fb0 to 0xec5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856c7980 INFO: task kworker/1:956:5670 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: af26c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:957:5672 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:957 state:D stack:0 pid:5672 tgid:5672 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec5cdd84 r8:00000002 r7:60000013 r6:ec5cdd8c r5:844c6000 r4:844c6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c7fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ef38c r4:856ef000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ef38c r4:856bd900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c6000 r8:856bd92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd900 r8:8027ecf4 r7:ec5b5e60 r6:856c4400 r5:844c6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5cdfb0 to 0xec5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856c7ac0 INFO: task kworker/1:957:5672 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: af4d2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:958 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8571c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c7e80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856eef8c r4:856eec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856eef8c r4:856bd980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571c800 r8:856bd9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bd980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bd980 r8:8027ecf4 r7:ec5cde60 r6:856bda00 r5:8571c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd4dfb0 to 0xebd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856c7ac0 INFO: task kworker/1:958:5673 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: af4d2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:959:5677 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:959 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec5c1d84 r8:00000002 r7:60000013 r6:ec5c1d8c r5:8571d400 r4:8571d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5d9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ef78c r4:856ef400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856ef78c r4:856bda80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571d400 r8:856bdaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bda80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bda80 r8:8027ecf4 r7:ec5cde60 r6:856bdb00 r5:8571d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c1fb0 to 0xec5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569c080 INFO: task kworker/1:959:5677 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: afa05000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:960:5678 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:960 state:D stack:0 pid:5678 tgid:5678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebd45d84 r8:00000002 r7:60000113 r6:ebd45d8c r5:8571e000 r4:8571e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856da040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571e000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f538c r4:856f5000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f538c r4:856bdb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571e000 r8:856bdbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bdb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bdb80 r8:8027ecf4 r7:ec5c1e60 r6:856bdc00 r5:8571e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd45fb0 to 0xebd45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569c080 INFO: task kworker/1:960:5678 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: afa05000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:961:5679 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:961 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec5edd84 r8:00000002 r7:60000113 r6:ec5edd8c r5:8571ec00 r4:8571ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8571ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569cac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0665000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856eff8c r4:856efc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856eff8c r4:856bdc80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571ec00 r8:856bdcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856bdc80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bdc80 r8:8027ecf4 r7:ebd45e60 r6:856bdd00 r5:8571ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5edfb0 to 0xec5edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569c080 INFO: task kworker/1:961:5679 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: afed6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:5682 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:5682 tgid:5682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec611d84 r8:00000002 r7:60000013 r6:ec611d8c r5:85720000 r4:85720000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85720000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854693c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85720000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8571638c r4:85716000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b0199000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85720c00 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c7c0 r7:dddced40 r6:83018000 r5:856efb8c r4:856c4500 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:5685 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:85722400 r4:85722400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85722400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85699c40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85722400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc93000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562ef8c r4:8562ec00 r7:dddced40 r6:83018000 r5:8562ef8c r4:856c4580 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 1d60: 80070013 ffffffff r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:962:5687 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:962 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ebc75d84 r8:00000002 r7:60000013 r6:ebc75d8c r5:85721800 r4:85721800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85721800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569ccc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85721800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f438c r4:856f4000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856bdf00 Exception stack(0xebc75fb0 to 0xebc75ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:963:5691 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:963 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec629d84 r8:00000002 r7:60000113 r6:ec629d8c r5:85724800 r4:85724800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85724800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec629e08 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:856ac000 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:964:5693 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:964 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec631d84 r8:00000002 r7:60000013 r6:ec631d8c r5:85725400 r4:85725400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85725400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569c940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85725400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f4b8c r4:856f4800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f4b8c r4:856ac100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85725400 r8:856ac12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ac100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac100 r8:8027ecf4 r7:ebd45e60 r6:856ac180 r5:85725400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec631fb0 to 0xec631ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:8569cf80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b114e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85726000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c7f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85726000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f4f8c r4:856f4c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f4f8c r4:856ac200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85726000 r8:856ac22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ac200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac200 r8:8027ecf4 r7:ebd45e60 r6:856ac280 r5:85726000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569cf80 INFO: task kworker/1:965:5695 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec639d84 r8:00000002 r7:60000113 r6:ec639d8c r5:85726c00 r4:85726c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85726c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856da400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85726c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f578c r4:856f5400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f578c r4:856ac300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85726c00 r8:856ac32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xec639fb0 to 0xec639ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:967:5699 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:967 state:D stack:0 pid:5699 tgid:5699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec63dd84 r8:00000002 r7:60000013 r6:ec63dd8c r5:8561ec00 r4:8561ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8561ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856da800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8561ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f5f8c r4:856f5c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f5f8c r4:856ac400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8561ec00 r8:856ac42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ac400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac400 r8:8027ecf4 r7:ec639e60 r6:856ac480 r5:8561ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856da280 INFO: task kworker/1:967:5699 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 task:kworker/1:968 state:D stack:0 pid:5701 tgid:5701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec641d84 r8:00000002 r7:60000013 r6:ec641d8c r5:85723c00 r4:85723c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85723c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec641e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856da600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85723c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f5b8c r4:856f5800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f5b8c r4:856ac500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85723c00 r8:856ac52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ac500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac500 r8:8027ecf4 r7:ec63de60 r6:856ac580 r5:85723c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec641fb0 to 0xec641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856da0c0 INFO: task kworker/1:968:5701 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b1e6b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:969:5703 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:969 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856daa00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85728000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f638c r4:856f6000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f638c r4:856ac600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85728000 r8:856ac62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ac600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac600 r8:8027ecf4 r7:ec63de60 r6:856ac680 r5:85728000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856da680 INFO: task kworker/1:969:5703 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b2043000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85728c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r5:856f6f8c r4:856f6c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac700 r8:8027ecf4 r7:ec645e60 r6:856ac780 r5:85728c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e9e08 r4:856ac800 r4:856da9c0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:972:5708 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:972 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec649d84 r8:00000002 r7:60000113 r6:ec649d8c r5:8572b000 r4:8572b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8572b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dac80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8572b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7dd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f6b8c r4:856f6800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f6b8c r4:856ac900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572b000 r8:856ac92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ac900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ac900 r8:8027ecf4 r7:ec62de60 r6:856ac980 r5:8572b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b2c69000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:973:5711 blocked for more than 473 seconds. task:kworker/1:973 state:D stack:0 pid:5711 tgid:5711 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8572bc00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec605e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:973:5711 is blocked on a mutex likely owned by task kworker/1:208:3660. r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:974:5714 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:974 state:D stack:0 pid:5714 tgid:5714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:8572c800 r4:8572c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8572c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec64de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8572c800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb851000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856f778c r4:856f7400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:856f778c r4:856acb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572c800 r8:856acb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856acb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856acb00 r8:8027ecf4 r7:ec605e60 r6:856acb80 r5:8572c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8474b340 INFO: task kworker/1:974:5714 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:976:5716 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:856f7f8c r4:856acd00 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:977:5719 blocked for more than 474 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec655e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:978:5721 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:978 state:D stack:0 pid:5721 tgid:5721 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec661d84 r8:00000002 r7:60000013 r6:ec661d8c r5:8572a400 r4:8572a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8572a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852135c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8572a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r5:00001000 r4:ebaad000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:856acf00 r8:8027ecf4 r7:ec655e60 r6:856acf80 r5:8572a400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85213240 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:82ac11e4 r4:00000000 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:979:5723 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:979 state:D stack:0 pid:5723 tgid:5723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec665d84 r8:00000002 r7:60000013 r6:ec665d8c r5:85723000 r4:85723000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85723000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebadf000 r7:ddde2d40 r6:83018200 r5:85700f8c r4:85048000 r10:00000000 r9:85048000 r8:8027ecf4 r7:ec661e60 r6:85048080 r5:85723000 Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:980 state:D stack:0 pid:5725 tgid:5725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec669d84 r8:00000002 r7:60000013 r6:ec669d8c r5:85730000 r4:85730000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85730000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85730000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebac7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85700b8c r4:85700800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85700b8c r4:85048100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85048100 r8:8027ecf4 r7:ec665e60 r6:85048180 r5:85730000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:981:5727 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:981 state:D stack:0 pid:5727 tgid:5727 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec671d84 r8:00000002 r7:60000113 r6:ec671d8c r5:85730c00 r4:85730c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85730c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85730c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85701b8c r4:85701800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85701b8c r4:85048200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85730c00 r8:8504822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048200 r8:8027ecf4 r7:ec665e60 r6:85048280 r5:85730c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 1d60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/1:982:5728 blocked for more than 474 seconds. task:kworker/1:982 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec65dd84 r8:00000002 r7:60000113 r6:ec65dd8c r5:85731800 r4:85731800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85731800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85731800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570138c r4:85701000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec679e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85048400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048400 r8:8027ecf4 r7:ec671e60 r6:85048480 r5:85733000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec679fb0 to 0xec679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85213a80 INFO: task kworker/1:983:5731 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b543e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 r5:85701f8c r4:85701c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85213cc0 INFO: task kworker/1:984:5733 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b543e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:85734800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r9:83018205 r8:85734800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:ee619000 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:85735400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85735400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85735400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb71000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570238c r4:85702000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570238c r4:85048700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85735400 r8:8504872c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048700 r8:8027ecf4 r7:ec67de60 r6:85048780 r5:85735400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec681fb0 to 0xec681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 INFO: task kworker/1:986:5737 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d60: 80070013 ffffffff r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:844c5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec695e08 r9:83018205 r8:844c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:847a6c80 r4:84789140 r4:85736c00 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570378c r4:85703400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570378c r4:85048900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85736c00 r8:8504892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048900 r8:8027ecf4 r7:ec67de60 r6:85048980 r5:85736c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e8400 INFO: task kworker/1:989:5743 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80070013 ffffffff r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 Not tainted 6.15.0-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r5:8562f78c r4:8562f400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:990:5746 blocked for more than 474 seconds. task:kworker/1:990 state:D stack:0 pid:5746 tgid:5746 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85718000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec699000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85048a80 Exception stack(0xec6a5fb0 to 0xec6a5ff8) Call trace: [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:991:5749 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:991 state:D stack:0 pid:5749 tgid:5749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6b9d84 r8:00000002 r7:60000113 r6:ec6b9d8c r5:85739800 r4:85739800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85739800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85048b80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84789140 task:kworker/1:992 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6cdd84 r8:00000002 r7:60000013 r6:ec6cdd8c r5:85738c00 r4:85738c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85738c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85738c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85703f8c r4:85703c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85703f8c r4:85048c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85738c00 r8:85048cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85048c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85048c80 r8:8027ecf4 r7:ec6b9e60 r6:85048d00 r5:85738c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6cdfb0 to 0xec6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:847e8a00 INFO: task kworker/1:992:5751 is blocked on a mutex likely owned by task kworker/1:208:3660. r4:00000000 r4:00000000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:84789140 r5:8573a400 r4:829189bc [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:85048d80 r4:847e8d40 Exception stack(0xe0451d20 to 0xe0451d68) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:84789140 [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8f40 r4:85048e80 r4:85213fc0 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:995:5757 blocked for more than 474 seconds. r5:85658000 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf9e08 r4:00000000 r5:8570d38c r4:8570d000 r4:85048f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 r5:00001000 r4:ee619000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056100 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aa8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570cb8c r4:8570c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570cb8c r4:851f9000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa8000 r8:851f902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9000 r8:8027ecf4 r7:ebcf9e60 r6:856c4800 r5:84aa8000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd35fb0 to 0xebd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85056040 INFO: task kworker/1:996:5758 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b8553000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:84a48000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd71e08 r7:ddde2d40 r6:83018200 r5:8570cf8c r4:851f9080 INFO: task kworker/1:997:5761 is blocked on a mutex likely owned by task kworker/1:208:3660. [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:00000001 Not tainted 6.15.0-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec585e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850565c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a48c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0867000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570d78c r4:8570d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570d78c r4:851f9100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a48c00 r8:851f912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9100 r8:8027ecf4 r7:ebcf9e60 r6:856c4900 r5:84a48c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec585fb0 to 0xec585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85056280 INFO: task kworker/1:998:5762 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: b8b13000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ec599d84 r8:00000002 r7:60000013 r6:ec599d8c r5:84a49800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec599e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056700 r7:ddde2d40 r6:83018200 r5:8570db8c r4:851f9180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1000:5767 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1000 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec5b9d84 r8:00000002 r7:60000113 r6:ec5b9d8c r5:84a4b000 r4:84a4b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a4b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb079000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a4b000 r8:851f922c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9200 r8:8027ecf4 r7:ec599e60 r6:856c4a00 r5:84a4b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85056380 INFO: task kworker/1:1000:5767 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84789140 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5dde08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1003:5773 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1003 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec615d84 r8:00000002 r7:60000013 r6:ec615d8c r5:84a4d400 r4:84a4d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a4d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056b40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4d400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb299000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570e78c r4:8570e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570e78c r4:851f9380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4d400 r8:851f93ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9380 r8:8027ecf4 r7:ec5d1e60 r6:856c4b80 r5:84a4d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec615fb0 to 0xec615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85056940 INFO: task kworker/1:1003:5773 is blocked on a mutex likely owned by task kworker/1:208:3660. r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:84789140 task:kworker/1:1004 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f5e08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d60: 80070013 ffffffff r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a4740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562fb8c r4:8562f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562fb8c r4:856c4c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4ec00 r8:856c4cac r7:82804d40 r6:dddced40 r5:dddced60 r4:856c4c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c4c80 r8:8027ecf4 r7:ec611e60 r6:856c4d00 r5:84a4ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a5fb0 to 0xec5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:853a42c0 INFO: task kworker/0:316:5778 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ba189000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1005:5780 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1005 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6e5d84 r8:00000002 r7:60000013 r6:ec6e5d8c r5:84a4a400 r4:84a4a400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a4a400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1240 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a4a400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba2f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570fb8c r4:8570f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570fb8c r4:851f9480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a4a400 r8:851f94ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9480 r8:8027ecf4 r7:ec6f5e60 r6:856c4d80 r5:84a4a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85056a80 INFO: task kworker/1:1005:5780 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ba7d6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:1006:5781 blocked for more than 474 seconds. task:kworker/1:1006 state:D stack:0 pid:5781 tgid:5781 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85056f80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84830000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570f38c r4:8570f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570f38c r4:851f9500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:851f952c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9500 r8:8027ecf4 r7:ec6e5e60 r6:856c4e00 r5:84830000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec701fb0 to 0xec701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85056a80 INFO: task kworker/1:1006:5781 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ba8b3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:5784 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec6f1d84 r8:00000002 r7:60000113 r6:ec6f1d8c r5:84830c00 r4:84830c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84830c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854691c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd65000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562ff8c r4:8562fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8562ff8c r4:856c4e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:856c4eac r7:82804d40 r6:dddced40 r5:dddced60 r4:856c4e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856c4e80 r8:8027ecf4 r7:ec611e60 r6:856c4f00 r5:84830c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6f1fb0 to 0xec6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:1007:5786 blocked for more than 475 seconds. r4:84832400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec70de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85699780 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec715d84 r8:00000002 r7:60000013 r6:ec715d8c r5:84833c00 r4:84833c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84833c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba97000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8570ff8c r4:8570fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8570ff8c r4:851f9600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833c00 r8:851f962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9600 r8:8027ecf4 r7:ec6e5e60 r6:847e2000 r5:84833c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec715fb0 to 0xec715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d10c0 INFO: task kworker/1:1008:5788 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:80070013 r4:80239bb0 r4:00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:1009:5790 blocked for more than 475 seconds. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ec721d84 r8:00000002 r7:60000113 r6:ec721d8c r5:84835400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84835400 r8:851f972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:855d1200 INFO: task kworker/1:1010:5791 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bc01e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1011:5793 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1011 state:D stack:0 pid:5793 tgid:5793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:84831800 r4:84831800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84831800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1940 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84831800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc57000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85714f8c r4:85714c00 r7:ddde2d40 r6:83018200 r5:85714f8c r4:851f9780 Exception stack(0xec73dfb0 to 0xec73dff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d17c0 r5:85714b8c r4:85714800 r10:00000000 r9:851f9800 r8:8027ecf4 r7:ec73de60 r6:847e2200 r5:84833000 r4:855d1440 INFO: task kworker/1:1012:5795 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bc54e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1013:5797 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1013 state:D stack:0 pid:5797 tgid:5797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec749d84 r8:00000002 r7:60000013 r6:ec749d8c r5:84836c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xec749fb0 to 0xec749ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85715b8c r4:851f9900 Exception stack(0xec751fb0 to 0xec751ff8) Workqueue: events bpf_prog_free_deferred 1d20: bd1fe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1015:5801 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1015 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec755d84 r8:00000002 r7:60000013 r6:ec755d8c r5:85678c00 r4:85678c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85678c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1880 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85678c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571578c r4:85715400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8571578c r4:851f9980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85678c00 r8:851f99ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9980 r8:8027ecf4 r7:ec751e60 r6:847e2380 r5:85678c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d1880 INFO: task kworker/1:1015:5801 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bd1fe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85716f8c r4:851f9a00 r10:61c88647 r9:8567a400 r8:851f9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9a00 r8:8027ecf4 r7:ec751e60 r6:847e2400 r5:8567a400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec75dfb0 to 0xec75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:855d19c0 INFO: task kworker/1:1016:5803 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bd991000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r5:8495ab8c r4:8495a800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:1017:5805 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1017 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec765d84 r8:00000002 r7:60000113 r6:ec765d8c r5:85679800 r4:85679800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85679800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855d1e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85679800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:85715f8c r4:85715c00 r4:851f9a80 5fa0: 00000000 00000000 00000000 00000000 Call trace: 1d60: 80070013 ffffffff r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:8567bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8578278c r4:85782400 r10:00000000 r9:847e2600 r8:8027ecf4 r7:ec611e60 r6:847e2680 r5:8567c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854690c0 INFO: task kworker/0:319:5810 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bdeee000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec76dd84 r8:00000002 r7:60000113 r6:ec76dd8c r5:8567ec00 r4:8567ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec76de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85469fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8567ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6cf000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578238c r4:85782000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578238c r4:847e2780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567ec00 r8:847e27ac r7:82804d40 r6:dddced40 r5:dddced60 r4:847e2780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e2780 r8:8027ecf4 r7:ec761e60 r6:847e2800 r5:8567ec00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1019:5816 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1019 state:D stack:0 pid:5816 tgid:5816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec779d84 r8:00000002 r7:60000113 r6:ec779d8c r5:8567b000 r4:8567b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec779e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a4e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8567b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 r5:85716b8c r4:85716800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:1019:5816 is blocked on a mutex likely owned by task kworker/1:208:3660. r4:82ac11e4 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:1020:5819 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:1020 state:D stack:0 pid:5819 tgid:5819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec61dd84 r8:00000002 r7:60000113 r6:ec61dd8c r5:85740c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec61dfb0 to 0xec61dff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475400 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85741800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8571778c r4:85717400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8571778c r4:851f9c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85741800 r8:851f9cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9c80 r8:8027ecf4 r7:ec61de60 r6:847e2980 r5:85741800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85475100 INFO: task kworker/1:1021:5820 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bf788000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854755c0 r5:85717b8c r4:85717800 r10:00000000 r9:851f9d00 r8:8027ecf4 r7:ec6e9e60 r6:847e2a00 r5:85742400 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bf788000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/1:1024:5826 blocked for more than 475 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854756c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8573d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85717f8c r4:85717c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85717f8c r4:851f9e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573d400 r8:851f9eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f9e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f9e80 r8:8027ecf4 r7:ec789e60 r6:851f9f00 r5:8573d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec771fb0 to 0xec771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85475440 INFO: task kworker/1:1024:5826 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: bfa61000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 Exception stack(0xe0451fb0 to 0xe0451ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829189c0 r9:ec791d84 r8:00000002 r7:60000013 r6:ec791d8c r5:85744800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:855e878c r4:855e8400 r10:00000000 r9:847e2a80 r8:8027ecf4 r7:ec761e60 r6:847e2b00 r5:85744800 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:8499278c r4:84992400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7a9fb0 to 0xec7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e01c0 INFO: task kworker/0:322:5856 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c039d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:5879 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:323 state:D stack:0 pid:5879 tgid:5879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec809d84 r8:00000002 r7:60000113 r6:ec809d8c r5:85745400 r4:85745400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ec581000 r7:dddced40 r6:83018000 r5:84991b8c r4:847e2c80 Exception stack(0xec809fb0 to 0xec809ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85746000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:325:5897 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:5897 tgid:5897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec821d84 r8:00000002 r7:60000113 r6:ec821d8c r5:85746c00 r4:85746c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85746c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e0c80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85746c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855feb8c r4:855fe800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855feb8c r4:847e2e80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85746c00 r8:847e2eac r7:82804d40 r6:dddced40 r5:dddced60 r4:847e2e80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xec821fb0 to 0xec821ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:5901 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85738000 r8:847e2fac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ec851d84 r8:00000002 r7:60000013 r6:ec851d8c r5:8573bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec851e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:5904 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:5904 tgid:5904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec855d84 r8:00000002 r7:60000013 r6:ec855d8c r5:8573c800 r4:8573c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8573c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e0a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8573c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e8b8c r4:855e8800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855e8b8c r4:8569e080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573c800 r8:8569e0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e080 r8:8027ecf4 r7:ec851e60 r6:85691180 r5:8573c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e0cc0 INFO: task kworker/0:328:5904 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8474b580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb869000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e978c r4:855e9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855e978c r4:8569e100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c6c00 r8:8569e12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e100 r8:8027ecf4 r7:ec851e60 r6:85691200 r5:844c6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e0900 INFO: task kworker/0:329:5907 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:330 state:D stack:0 pid:5909 tgid:5909 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85732400 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r4:00000000 r5:855e938c r4:855e9000 r10:00000000 r9:8569e180 r8:8027ecf4 r7:ec859e60 r6:85691280 r5:85732400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:852e0cc0 INFO: task kworker/0:330:5909 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c1d7f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84870000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855e9b8c r4:855e9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855e9b8c r4:8569e200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870000 r8:8569e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e200 r8:8027ecf4 r7:ec859e60 r6:85691300 r5:84870000 Exception stack(0xec861fb0 to 0xec861ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495ab8c r4:8495a800 r4:847a6c80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:5913 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec865d84 r8:00000002 r7:60000013 r6:ec865d8c r5:84870c00 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f100 r7:dddced40 r6:83018000 r5:855e9f8c r4:8569e280 Exception stack(0xec865fb0 to 0xec865ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 r4:84871800 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:855ea78c r4:8569e300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84871800 r8:8569e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e300 r8:8027ecf4 r7:ec865e60 r6:85691400 r5:84871800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec869fb0 to 0xec869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569f200 INFO: task kworker/0:333:5915 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c287e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:334:5917 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:334 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec86dd84 r8:00000002 r7:60000113 r6:ec86dd8c r5:84872400 r4:84872400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84872400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebad7000 r10:61c88647 r9:84872400 r8:8569e3ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Not tainted 6.15.0-syzkaller #0 r4:84873000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:855eaf8c r4:855eac00 r10:00000000 r9:8569e400 r8:8027ecf4 r7:ec869e60 r6:85691500 r5:84873000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:336:5920 blocked for more than 475 seconds. r5:84873c00 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:5923 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:5923 tgid:5923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec879d84 r8:00000002 r7:60000013 r6:ec879d8c r5:84874800 r4:84874800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84874800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f9c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84874800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc35000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855eb38c r4:855eb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855eb38c r4:8569e500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84874800 r8:8569e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e500 r8:8027ecf4 r7:ec871e60 r6:85691600 r5:84874800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569f740 INFO: task kworker/0:337:5923 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c3201000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:338:5925 blocked for more than 475 seconds. r10:829189c0 r9:ec87dd84 r8:00000002 r7:60000113 r6:ec87dd8c r5:84875400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569f840 INFO: task kworker/0:338:5925 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c3551000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:5927 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec881d84 r8:00000002 r7:60000013 r6:ec881d8c r5:84876000 r4:84876000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84876000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec881e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:340:5929 blocked for more than 475 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:5932 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:5932 tgid:5932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec889d84 r8:00000002 r7:60000113 r6:ec889d8c r5:85748c00 r4:85748c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85748c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569fec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85748c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c838c r4:855c8000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c838c r4:8569e700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748c00 r8:8569e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e700 r8:8027ecf4 r7:ec885e60 r6:85691800 r5:85748c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec889fb0 to 0xec889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569fb80 INFO: task kworker/0:341:5932 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r10:829189c0 r9:ec895d84 r8:00000002 r7:60000113 r6:ec895d8c r5:8574b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec895e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569f900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c878c r4:855c8400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c878c r4:8569e780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574b000 r8:8569e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569e780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569e780 r8:8027ecf4 r7:ec889e60 r6:85691880 r5:8574b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec895fb0 to 0xec895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8569fcc0 INFO: task kworker/0:342:5935 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c3d25000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:855c8b8c r4:855c8800 r4:8569e800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:5938 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec89dd84 r8:00000002 r7:60000013 r6:ec89dd8c r5:85748000 r4:85748000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85748000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec89de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85748000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c938c r4:855c9000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:345:5940 blocked for more than 476 seconds. r10:829189c0 r9:ec8a1d84 r8:00000002 r7:60000113 r6:ec8a1d8c r5:8574bc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a1e08 r9:83018005 r8:8574bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 r10:61c88647 r9:8574bc00 r8:8569e92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Exception stack(0xe0451d20 to 0xe0451d68) r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:5942 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:5942 tgid:5942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:8574c800 r4:8574c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec813000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c978c r4:855c9400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c978c r4:8569ea00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574d400 r8:8569ea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ea00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ea00 r8:8027ecf4 r7:ec8a5e60 r6:85691b00 r5:8574d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8adfb0 to 0xec8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219380 INFO: task kworker/0:347:5944 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:5945 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:5945 tgid:5945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec88dd84 r8:00000002 r7:60000113 r6:ec88dd8c r5:8574e000 r4:8574e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219700 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c9b8c r4:855c9800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c9b8c r4:8569ea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574e000 r8:8569eaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ea80 r8:8027ecf4 r7:ec8a5e60 r6:85691b80 r5:8574e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec88dfb0 to 0xec88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219040 INFO: task kworker/0:348:5945 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:5950 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:857f0000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:857f0000 r8:8569eb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: c4a39000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:847a6c80 r4:00000001 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:5953 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:5953 tgid:5953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8f5d84 r8:00000002 r7:60000013 r6:ec8f5d8c r5:857f2400 r4:857f2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ca78c r4:855ca400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ca78c r4:8569eb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f2400 r8:8569ebac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569eb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569eb80 r8:8027ecf4 r7:ec8a5e60 r6:85691c80 r5:857f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8f5fb0 to 0xec8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219780 INFO: task kworker/0:350:5953 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c508d000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:351:5954 blocked for more than 476 seconds. r5:857f3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:855cab8c r4:855ca800 r4:8569ec00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:5956 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:5956 tgid:5956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec911d84 r8:00000002 r7:60000013 r6:ec911d8c r5:857f1800 r4:857f1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec911e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cb38c r4:855cb000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cb38c r4:8569ec80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f1800 r8:8569ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ec80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ec80 r8:8027ecf4 r7:ec8f9e60 r6:85691d80 r5:857f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec911fb0 to 0xec911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219a80 INFO: task kworker/0:352:5956 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:85740000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c1e08 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c5473000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:5960 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:5960 tgid:5960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:85743c00 r4:85743c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85743c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8520e3c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85743c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec929000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbb8c r4:855cb800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cbb8c r4:8569ee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85743c00 r8:8569ee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8569ee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569ee00 r8:8027ecf4 r7:ec911e60 r6:8569ee80 r5:85743c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec905fb0 to 0xec905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219c40 INFO: task kworker/0:354:5960 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:355:5961 blocked for more than 476 seconds. r5:84836000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219f80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c5aef000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:5964 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:5964 tgid:5964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec92dd84 r8:00000002 r7:60000113 r6:ec92dd8c r5:8567e000 r4:8567e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8567e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec92de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8567e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec935000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbf8c r4:855cbc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cbf8c r4:85481000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567e000 r8:8548102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481000 r8:8027ecf4 r7:ec905e60 r6:85481080 r5:8567e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec92dfb0 to 0xec92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 task:kworker/0:357 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:ec94d000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec945e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0eb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec941000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575838c r4:85758000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575838c r4:85481200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a90c00 r8:8548122c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481200 r8:8027ecf4 r7:ec939e60 r6:85481280 r5:84a90c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec945fb0 to 0xec945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85470180 INFO: task kworker/0:358:5968 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c6541000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:5970 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:5970 tgid:5970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec951d84 r8:00000002 r7:60000013 r6:ec951d8c r5:84a91800 r4:84a91800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a91800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec951e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470980 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a91800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec971000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84a91800 r8:8548132c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0451d20 to 0xe0451d68) r4:82ac11e4 r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:5972 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:5972 tgid:5972 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec95dd84 r8:00000002 r7:60000013 r6:ec95dd8c r5:84a92400 r4:84a92400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a92400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec95de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec959000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85758b8c r4:85758800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85758b8c r4:85481400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a92400 r8:8548142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481400 r8:8027ecf4 r7:ec951e60 r6:85481480 r5:84a92400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: c6bf6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec965000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85758f8c r4:85758c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85758f8c r4:85481500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a93c00 r8:8548152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481500 r8:8027ecf4 r7:ec951e60 r6:85481580 r5:84a93c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec921fb0 to 0xec921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854706c0 INFO: task kworker/0:361:5973 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c6f1f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:362:5976 blocked for more than 476 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c71da000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0451fb0 to 0xe0451ff8) Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85481700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481700 r8:8027ecf4 r7:ec969e60 r6:85481780 r5:84a95400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec97dfb0 to 0xec97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85470940 INFO: task kworker/0:363:5978 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829189c0 r9:ec989d84 r8:00000002 r7:60000113 r6:ec989d8c r5:84a96000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ec985000 r4:85481800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ec99d000 r4:85481900 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c7ac2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:5984 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:5984 tgid:5984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9a1d84 r8:00000002 r7:60000113 r6:ec9a1d8c r5:84a93000 r4:84a93000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a93000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85219400 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:5986 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9add84 r8:00000002 r7:60000013 r6:ec9add8c r5:848b0000 r4:848b0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856a3ac0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575a78c r4:8575a400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575a78c r4:85481b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0000 r8:85481b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481b00 r8:8027ecf4 r7:ec9a1e60 r6:85481b80 r5:848b0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85219000 INFO: task kworker/0:367:5986 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c7ac2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:e07ff000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575af8c r4:8575ac00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575af8c r4:85481c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b0c00 r8:85481c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481c00 r8:8027ecf4 r7:ec9a1e60 r6:85481c80 r5:848b0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856a3380 INFO: task kworker/0:368:5988 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c8468000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:5991 tgid:5991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec849d84 r8:00000002 r7:60000113 r6:ec849d8c r5:848b1800 r4:848b1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854672c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0fd000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8575b38c r4:8575b000 r10:00000000 r9:85481d00 r8:8027ecf4 r7:ec82de60 r6:85481d80 r5:848b1800 r4:85467200 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85481e00 r8:8027ecf4 r7:ec849e60 r6:85481e80 r5:848b2400 r4:85467140 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r5:848b3000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f101000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575bb8c r4:8575b800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8575bb8c r4:85481f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b3000 r8:85481f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85481f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85481f00 r8:8027ecf4 r7:ec9b1e60 r6:85481f80 r5:848b3000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b5fb0 to 0xec9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467340 INFO: task kworker/0:371:5995 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c8a65000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467940 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467480 INFO: task kworker/0:372:5996 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c8a65000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:373:5998 blocked for more than 476 seconds. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8575bf8c r4:8575bc00 r4:852ea100 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c8ea3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:6001 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9c1d84 r8:00000002 r7:60000013 r6:ec9c1d8c r5:848b5400 r4:848b5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467a80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f107000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576078c r4:85760400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576078c r4:852ea200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:852ea22c r7:82804d40 r6:dddced40 r5:dddced60 r4:852ea200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ea200 r8:8027ecf4 r7:ec9b9e60 r6:852ea280 r5:848b5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c1fb0 to 0xec9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:854677c0 INFO: task kworker/0:374:6001 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c9402000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:6002 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:6002 tgid:6002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9c9d84 r8:00000002 r7:60000013 r6:ec9c9d8c r5:848b6000 r4:848b6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467c00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f109000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85760b8c r4:85760800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85760b8c r4:852ea300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6000 r8:852ea32c r7:82804d40 r6:dddced40 r5:dddced60 r4:852ea300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ea300 r8:8027ecf4 r7:ec9c1e60 r6:852ea380 r5:848b6000 Exception stack(0xec9c9fb0 to 0xec9c9ff8) r4:85467900 Workqueue: events bpf_prog_free_deferred 1d20: c9402000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:6004 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:6004 tgid:6004 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9cdd84 r8:00000002 r7:60000113 r6:ec9cdd8c r5:849f0000 r4:849f0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9cde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467ec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f10b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85760f8c r4:85760c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85760f8c r4:852ea400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:852ea400 r8:8027ecf4 r7:ec9c9e60 r6:852ea480 r5:849f0000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:6006 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9d1d84 r8:00000002 r7:60000113 r6:ec9d1d8c r5:849f1800 r4:849f1800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f1800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9d1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f10d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576138c r4:85761000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576138c r4:852ea500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f1800 r8:852ea52c r7:82804d40 r6:dddced40 r5:dddced60 r4:852ea500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ea500 r8:8027ecf4 r7:ec9cde60 r6:852ea580 r5:849f1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d1fb0 to 0xec9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467d40 INFO: task kworker/0:377:6006 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: c9dc9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) r4:84789140 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 r5:849f0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85761b8c r4:852ea700 r10:00000000 r9:852ea700 r8:8027ecf4 r7:ec9d5e60 r6:852ea780 r5:849f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9d9fb0 to 0xec9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cb100 INFO: task kworker/0:379:6009 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ca07f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:380:6012 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:380 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849f3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856cb100 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ca303000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:856cb4c0 Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:6016 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:6016 tgid:6016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9e5d84 r8:00000002 r7:60000013 r6:ec9e5d8c r5:849f5400 r4:849f5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849f5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cbec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f11d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec717000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576338c r4:85763000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576338c r4:852eaa00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849f5400 r8:852eaa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852eaa00 Exception stack(0xec9e5fb0 to 0xec9e5ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cba40 r7:dddced40 r6:83018000 r5:8576278c r4:852eab00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:856cb8c0 INFO: task kworker/0:383:6018 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ca745000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r9:83018005 r8:849f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f119000 r10:61c88647 r9:849f6c00 r8:852eac2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cbd40 r7:dddced40 r6:83018000 r5:85762f8c r4:852ead00 r4:852ead00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ead00 r8:8027ecf4 r7:ec9e5e60 r6:852ead80 r5:849f2400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cbc80 INFO: task kworker/0:385:6021 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: caeb9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:6024 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9f1d84 r8:00000002 r7:60000113 r6:ec9f1d8c r5:848b6c00 r4:848b6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848b6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cb080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec74b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576378c r4:85763400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576378c r4:852eae00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b6c00 r8:852eae2c r7:82804d40 r6:dddced40 r5:dddced60 r4:852eae00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852eae00 r8:8027ecf4 r7:ec9e5e60 r6:852eae80 r5:848b6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cbcc0 INFO: task kworker/0:386:6024 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:857d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f121000 r4:852eaf00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec9fdd84 r8:00000002 r7:60000113 r6:ec9fdd8c r5:857d0c00 r4:857d0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f123000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec837000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85763f8c r4:85763c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85763f8c r4:856be000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d0c00 r8:856be02c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be000 r8:8027ecf4 r7:ec9f9e60 r6:856be080 r5:857d0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85467e00 INFO: task kworker/0:388:6028 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 Exception stack(0xe0451fb0 to 0xe0451ff8) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:00000000 r9:856be100 r8:8027ecf4 r7:ec9fde60 r6:856be180 r5:857d1800 Exception stack(0xe0451d20 to 0xe0451d68) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca05d84 r8:00000002 r7:60000113 r6:eca05d8c r5:857d2400 r4:857d2400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r7:dddced40 r6:83018000 r5:8576c78c r4:856be200 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cbbc9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:857d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f129000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576cb8c r4:8576c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:856be300 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:6036 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:857d3c00 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeca19fb0 to 0xeca19ff8) [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 Exception stack(0xe0451fb0 to 0xe0451ff8) task:kworker/0:393 state:D stack:0 pid:6038 tgid:6038 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeca25fb0 to 0xeca25ff8) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:6040 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:6040 tgid:6040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca49d84 r8:00000002 r7:60000113 r6:eca49d8c r5:857f3c00 r4:857f3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bb8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f12d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca2d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576d38c r4:8576d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576d38c r4:856be600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3c00 r8:856be62c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be600 r8:8027ecf4 r7:eca25e60 r6:85691e00 r5:857f3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bb740 INFO: task kworker/0:394:6040 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cc4db000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:6042 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:6042 tgid:6042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca4dd84 r8:00000002 r7:60000113 r6:eca4dd8c r5:857f6000 r4:857f6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca4de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bba40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f12f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca39000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576d78c r4:8576d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576d78c r4:856be680 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6000 r8:856be6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be680 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be680 r8:8027ecf4 r7:eca25e60 r6:85691e80 r5:857f6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca4dfb0 to 0xeca4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bb840 INFO: task kworker/0:395:6042 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cca60000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:6044 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:6044 tgid:6044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca59d84 r8:00000002 r7:60000113 r6:eca59d8c r5:857f6c00 r4:857f6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca59e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbcc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f139000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca75000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576e78c r4:8576e400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576e78c r4:856be700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6c00 r8:856be72c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be700 r8:8027ecf4 r7:eca25e60 r6:85691f00 r5:857f6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca59fb0 to 0xeca59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bba80 INFO: task kworker/0:396:6044 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cca60000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:6045 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:6045 tgid:6045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca5dd84 r8:00000002 r7:60000013 r6:eca5dd8c r5:857f0c00 r4:857f0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbd80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f133000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca55000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576df8c r4:8576dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576df8c r4:856be780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0c00 r8:856be7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be780 r8:8027ecf4 r7:eca59e60 r6:85691f80 r5:857f0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca5dfb0 to 0xeca5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bb940 INFO: task kworker/0:397:6045 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ccce3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:6048 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca31d84 r8:00000002 r7:60000113 r6:eca31d8c r5:857f5400 r4:857f5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bbec0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f137000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576e38c r4:8576e000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576e38c r4:856be800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f5400 r8:856be82c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be800 r8:8027ecf4 r7:eca59e60 r6:85493000 r5:857f5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca31fb0 to 0xeca31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856bbe00 INFO: task kworker/0:398:6048 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ccce3000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:6052 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca91d84 r8:00000002 r7:60000013 r6:eca91d8c r5:8574ec00 r4:8574ec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8574ec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f13b000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca7d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576eb8c r4:8576e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576eb8c r4:856be880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574ec00 r8:856be8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be880 r8:8027ecf4 r7:eca59e60 r6:85493080 r5:8574ec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca91fb0 to 0xeca91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498080 INFO: task kworker/0:399:6052 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd13b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:6053 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:6053 tgid:6053 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca9dd84 r8:00000002 r7:60000013 r6:eca9dd8c r5:857f4800 r4:857f4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854987c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f143000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576fb8c r4:8576f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576fb8c r4:856be900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f4800 r8:856be92c r7:82804d40 r6:dddced40 r5:dddced60 r4:856be900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be900 r8:8027ecf4 r7:eca91e60 r6:85493100 r5:857f4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca9dfb0 to 0xeca9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498240 INFO: task kworker/0:400:6053 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd13b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:6054 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:6054 tgid:6054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca3dd84 r8:00000002 r7:60000113 r6:eca3dd8c r5:857d6000 r4:857d6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498080 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f13d000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576ef8c r4:8576ec00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576ef8c r4:856be980 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6000 r8:856be9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:856be980 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856be980 r8:8027ecf4 r7:eca9de60 r6:856bea00 r5:857d6000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca3dfb0 to 0xeca3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498240 INFO: task kworker/0:401:6054 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd6fe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:6057 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:6057 tgid:6057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:eca8dd84 r8:00000002 r7:60000013 r6:eca8dd8c r5:857d6c00 r4:857d6c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854984c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f13f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8576f38c r4:8576f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8576f38c r4:856bea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d6c00 r8:856beaac r7:82804d40 r6:dddced40 r5:dddced60 r4:856bea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bea80 r8:8027ecf4 r7:eca9de60 r6:856beb00 r5:857d6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498500 INFO: task kworker/0:402:6057 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cd6fe000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:6058 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:6058 tgid:6058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecaadd84 r8:00000002 r7:60000013 r6:ecaadd8c r5:857d5400 r4:857d5400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857d5400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaade08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:857d5400 r8:856bebac r7:82804d40 r6:dddced40 r5:dddced60 r4:856beb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856beb80 r8:8027ecf4 r7:eca9de60 r6:856bec00 r5:857d5400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaadfb0 to 0xecaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498500 INFO: task kworker/0:403:6058 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cdd0b000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee619000 1fa0: 00000000 00000000 00000000 00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r7:dddced40 r6:83018000 r5:8577438c r4:856bec80 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab9fb0 to 0xecab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498640 INFO: task kworker/0:404:6061 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r5:844b8c00 r4:829189bc [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854988c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f145000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856bed80 r8:8027ecf4 r7:ecab9e60 r6:856bee00 r5:844b8c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:406 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:844b9800 r8:856beeac r7:82804d40 r6:dddced40 r5:dddced60 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) Exception stack(0xe0451fb0 to 0xe0451ff8) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad1e08 r5:00001000 r4:eaedb000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85774b8c r4:85774800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85774b8c r4:856bef80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ba400 r8:856befac r7:82804d40 r6:dddced40 r5:dddced60 r4:856bef80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856bef80 r8:8027ecf4 r7:ec9f5e60 r6:855ee000 r5:844ba400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498ac0 INFO: task kworker/0:407:6067 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ce8da000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:6069 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:6069 tgid:6069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec7e1d84 r8:00000002 r7:60000113 r6:ec7e1d8c r5:844bb000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xec7e1fb0 to 0xec7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498b40 INFO: task kworker/0:408:6069 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: ceecd000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 INFO: task kworker/0:409:6070 blocked for more than 477 seconds. r4:844bbc00 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577538c r4:85775000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577538c r4:855ee180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bbc00 r8:855ee1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee180 r8:8027ecf4 r7:ec7e1e60 r6:855ee200 r5:844bbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaddfb0 to 0xecaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85498b40 INFO: task kworker/0:409:6070 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cf1b2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:410:6073 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:410 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577578c r4:85775400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577578c r4:855ee280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bc800 r8:855ee2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee280 r8:8027ecf4 r7:ecadde60 r6:855ee300 r5:844bc800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831000 INFO: task kworker/0:410:6073 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0451dc0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:411:6075 blocked for more than 477 seconds. r10:829189c0 r9:ec915d84 r8:00000002 r7:60000113 r6:ec915d8c r5:844bd400 r4:844bd400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bd400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831380 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85775b8c r4:85775800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85775b8c r4:855ee380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bd400 r8:855ee3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee380 r8:8027ecf4 r7:ec8dde60 r6:855ee400 r5:844bd400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85831000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:6078 tgid:6078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecae1d84 r8:00000002 r7:60000013 r6:ecae1d8c r5:844be000 r4:844be000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844be000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858314c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844be000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85775f8c r4:85775c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85775f8c r4:855ee480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844be000 r8:855ee4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee480 r8:8027ecf4 r7:ec915e60 r6:855ee500 r5:844be000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831200 INFO: task kworker/0:412:6078 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cf9a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:6079 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:6079 tgid:6079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecaedd84 r8:00000002 r7:60000113 r6:ecaedd8c r5:857f9800 r4:857f9800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f9800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaede08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c9000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8577638c r4:855ee580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f9800 r8:855ee5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee580 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee580 r8:8027ecf4 r7:ecae1e60 r6:85493180 r5:857f9800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaedfb0 to 0xecaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831340 INFO: task kworker/0:413:6079 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: cf9a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:6081 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:6081 tgid:6081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecaf5d84 r8:00000002 r7:60000113 r6:ecaf5d8c r5:857f8c00 r4:857f8c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831740 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaab000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577678c r4:85776400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577678c r4:855ee600 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8c00 r8:855ee62c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee600 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee600 r8:8027ecf4 r7:ecaede60 r6:85493200 r5:857f8c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf5fb0 to 0xecaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ecaf9d84 r8:00000002 r7:60000013 r6:ecaf9d8c r5:857fa400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831f40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec621000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85777f8c r4:85777c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:847a6c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776b8c r4:85776800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85776b8c r4:855ee700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:855ee72c r7:82804d40 r6:dddced40 r5:dddced60 r4:855ee700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855ee700 r8:8027ecf4 r7:ecaf9e60 r6:85493300 r5:857fbc00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb01fb0 to 0xecb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831580 INFO: task kworker/0:416:6084 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d03eb000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r10:829189c0 r9:ecb09d84 r8:00000002 r7:60000013 r6:ecb09d8c r5:857fb000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831a00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb11000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776f8c r4:85776c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85776f8c r4:855ee780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fb000 r8:855ee7ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:855ee780 r8:8027ecf4 r7:ecaf9e60 r6:85493380 r5:857fb000 Workqueue: events bpf_prog_free_deferred r4:e0451dc0 r5:00001000 r4:ee619000 r4:847a6c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:6088 tgid:6088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb11d84 r8:00000002 r7:60000113 r6:ecb11d8c r5:857f8000 r4:857f8000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857f8000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r5:8577738c r4:85777000 Exception stack(0xecb11fb0 to 0xecb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831800 INFO: task kworker/0:418:6088 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8495ab8c r4:8495a800 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:6090 tgid:6090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb19d84 r8:00000002 r7:60000113 r6:ecb19d8c r5:857fe000 r4:857fe000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fe000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb19e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebc63000 r10:00000000 r9:855ee880 r8:8027ecf4 r7:ecaf9e60 r6:85493480 r5:857fe000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:6092 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:6092 tgid:6092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:857fec00 r4:857fec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85831dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85777b8c r4:855ee900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:6095 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:6095 tgid:6095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb29d84 r8:00000002 r7:60000013 r6:ecb29d8c r5:857fc800 r4:857fc800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857fc800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb29e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584c0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6f9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:857fc800 r8:855ee9ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:422:6096 blocked for more than 477 seconds. r10:829189c0 r9:ecb2dd84 r8:00000002 r7:60000113 r6:ecb2dd8c r5:857fd400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb2de08 r9:83018005 r8:857fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r10:61c88647 r9:857fd400 r8:855eea2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb2dfb0 to 0xecb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85831d40 INFO: task kworker/0:422:6096 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d173c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:423:6099 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:6099 tgid:6099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:8574a400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:ec6d3000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585c78c r4:8585c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585c78c r4:855eea80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574a400 r8:855eeaac r7:82804d40 r6:dddced40 r5:dddced60 r4:855eea80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eea80 r8:8027ecf4 r7:ecb29e60 r6:85493680 r5:8574a400 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb35d84 r8:00000002 r7:60000013 r6:ecb35d8c r5:85800000 r4:85800000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85800000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb35e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584c5c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85800000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec815000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585d78c r4:8585d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585d78c r4:855eeb00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85800000 r8:855eeb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eeb00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eeb00 r8:8027ecf4 r7:ecb29e60 r6:85493700 r5:85800000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb35fb0 to 0xecb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d173c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584c340 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85800c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec77b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585cf8c r4:8585cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585cf8c r4:855eeb80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85800c00 r8:855eebac r7:82804d40 r6:dddced40 r5:dddced60 r4:855eeb80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eeb80 r8:8027ecf4 r7:ecb35e60 r6:85493780 r5:85800c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb39fb0 to 0xecb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c240 INFO: task kworker/0:425:6102 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d203e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85801800 r8:855eec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eec00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eec00 r8:8027ecf4 r7:ecb35e60 r6:85493800 r5:85801800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb3dfb0 to 0xecb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c380 INFO: task kworker/0:426:6105 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d203e000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:6107 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:6107 tgid:6107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85802400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:855eec80 r8:8027ecf4 r7:ecb35e60 r6:85493880 r5:85802400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c280 INFO: task kworker/0:427:6107 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d2422000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) Not tainted 6.15.0-syzkaller #0 r4:85804800 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8585df8c r4:8585dc00 r10:00000000 r9:855eed00 r8:8027ecf4 r7:ecb41e60 r6:85493900 r5:85804800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c580 INFO: task kworker/0:428:6110 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d2422000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:6111 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:6111 tgid:6111 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829189c0 r9:ecb51d84 r8:00000002 r7:60000113 r6:ecb51d8c r5:85805400 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:430:6114 blocked for more than 477 seconds. Call trace: [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85803c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec923000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585f78c r4:8585f400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585f78c r4:855eee00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85803c00 r8:855eee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eee00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eee00 r8:8027ecf4 r7:ecb51e60 r6:85493a00 r5:85803c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb5dfb0 to 0xecb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c840 INFO: task kworker/0:430:6114 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d26cc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 Not tainted 6.15.0-syzkaller #0 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d2d04000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:6117 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb1dd84 r8:00000002 r7:60000113 r6:ecb1dd8c r5:857e0000 r4:857e0000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e0000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8584cc00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585eb8c r4:8585e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585eb8c r4:855eef00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0000 r8:855eef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855eef00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855eef00 r8:8027ecf4 r7:ecb5de60 r6:855eef80 r5:857e0000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb1dfb0 to 0xecb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584c900 INFO: task kworker/0:432:6117 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 Exception stack(0xe0451d20 to 0xe0451d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:6119 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:6119 tgid:6119 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8585ef8c r4:8585ec00 r4:85856000 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856000 r8:8027ecf4 r7:ecb5de60 r6:85856080 r5:857e1800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8584cb80 INFO: task kworker/0:433:6119 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 1d20: d32fc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8495ab8c r4:8495a800 r4:847a6c80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:434 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:e0451dc0 r4:00000000 r5:8495ab8c r4:8495a800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:6124 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:6124 tgid:6124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb71d84 r8:00000002 r7:60000113 r6:ecb71d8c r5:857e3c00 r4:857e3c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e3c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855140 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec931000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585fb8c r4:8585f800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8585fb8c r4:85856200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e3c00 r8:8585622c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856200 r8:8027ecf4 r7:ecb5de60 r6:85856280 r5:857e3c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:00000000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847a6c80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:436:6126 blocked for more than 477 seconds. r10:829189c0 r9:ecb75d84 r8:00000002 r7:60000013 r6:ecb75d8c r5:857e5400 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d4198000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:6128 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb79d84 r8:00000002 r7:60000113 r6:ecb79d8c r5:857e6000 r4:857e6000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e6000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0451dc0 r4:00000000 r5:00001000 r4:ee619000 r5:8495ab8c r4:8495a800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:438:6129 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred r5:857e6c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855600 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec953000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586038c r4:85860000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586038c r4:85856500 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e6c00 r8:8585652c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856500 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856500 r8:8027ecf4 r7:ecb79e60 r6:85856580 r5:857e6c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855480 INFO: task kworker/0:438:6129 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d4dd2000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:439:6133 blocked for more than 477 seconds. r5:857e2400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855bc0 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r5:00001000 r4:ee619000 r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:6134 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ec8e5d84 r8:00000002 r7:60000113 r6:ec8e5d8c r5:857e4800 r4:857e4800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e4800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85860b8c r4:85860800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85860b8c r4:85856700 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e4800 r8:8585672c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856700 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856700 r8:8027ecf4 r7:ecb6de60 r6:85856780 r5:857e4800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855680 INFO: task kworker/0:440:6134 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d52da000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:6135 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:6135 tgid:6135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:857e0c00 r4:857e0c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:857e0c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855d00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586138c r4:85861000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586138c r4:85856800 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0c00 r8:8585682c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856800 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856800 r8:8027ecf4 r7:ecb6de60 r6:85856880 r5:857e0c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb85fb0 to 0xecb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855680 INFO: task kworker/0:441:6135 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d55a9000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:442:6138 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:442 state:D stack:0 pid:6138 tgid:6138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb81d84 r8:00000002 r7:60000113 r6:ecb81d8c r5:844bec00 r4:844bec00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bec00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ef000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586178c r4:85861400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586178c r4:85856900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bec00 r8:8585692c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856900 r8:8027ecf4 r7:ecb85e60 r6:85856980 r5:844bec00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb81fb0 to 0xecb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855b80 INFO: task kworker/0:442:6138 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d55e8000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:6140 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:6140 tgid:6140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb8dd84 r8:00000002 r7:60000013 r6:ecb8dd8c r5:84860000 r4:84860000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84860000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb8de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855fc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecad9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85861b8c r4:85861800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85861b8c r4:85856a00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860000 r8:85856a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856a00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856a00 r8:8027ecf4 r7:ecb81e60 r6:85856a80 r5:84860000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb8dfb0 to 0xecb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:85855cc0 INFO: task kworker/0:443:6140 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d57bc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb91d84 r8:00000002 r7:60000113 r6:ecb91d8c r5:84860c00 r4:84860c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84860c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0500 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbb1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586278c r4:85862400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586278c r4:85856b00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:85856b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856b00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856b00 r8:8027ecf4 r7:ecb8de60 r6:85856b80 r5:84860c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb91fb0 to 0xecb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0000 INFO: task kworker/0:444:6142 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80070013 ffffffff r4:e0451dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:6145 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:6145 tgid:6145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb9dd84 r8:00000002 r7:60000113 r6:ecb9dd8c r5:84861800 r4:84861800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84861800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb9de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0040 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84861800 r7:00000000 r6:83018000 r5:00001000 r4:7f0f3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb99000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85861f8c r4:85861c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85861f8c r4:85856c00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84861800 r8:85856c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856c00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856c00 r8:8027ecf4 r7:ecb91e60 r6:85856c80 r5:84861800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0240 INFO: task kworker/0:445:6145 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d5ea5000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:6146 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:6146 tgid:6146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb89d84 r8:00000002 r7:60000113 r6:ecb89d8c r5:84862400 r4:84862400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84862400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb89e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0300 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecba5000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586238c r4:85862000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586238c r4:85856d00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84862400 r8:85856d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856d00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856d00 r8:8027ecf4 r7:ecb91e60 r6:85856d80 r5:84862400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb89fb0 to 0xecb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0240 INFO: task kworker/0:446:6146 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d60dd000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:447:6149 blocked for more than 478 seconds. r4:84863000 r5:84863000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0640 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84863000 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbbd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85862b8c r4:85862800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85862b8c r4:85856e00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863000 r8:85856e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856e00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856e00 r8:8027ecf4 r7:ecb91e60 r6:85856e80 r5:84863000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba9fb0 to 0xecba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0380 INFO: task kworker/0:447:6149 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:448:6150 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbd1d84 r8:00000002 r7:60000113 r6:ecbd1d8c r5:85809800 r4:85809800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85809800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858a0800 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85809800 r7:00000000 r6:83018000 r5:00001000 r4:7f0fb000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc9000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85862f8c r4:85862c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85862f8c r4:85856f00 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85809800 r8:85856f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85856f00 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85856f00 r8:8027ecf4 r7:ecba9e60 r6:85493b00 r5:85809800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 1d20: d60dd000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:6152 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:6152 tgid:6152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbe9d84 r8:00000002 r7:60000013 r6:ecbe9d8c r5:8580bc00 r4:8580bc00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580bc00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe9e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d33c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84992f8c r4:85856f80 r4:85856f80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:858a0680 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d6953000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:450:6153 blocked for more than 478 seconds. r10:829189c0 r9:ecbedd84 r8:00000002 r7:60000013 r6:ecbedd8c r5:8580a400 r5:8580a400 r4:829189bc r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:451:6155 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:451 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:8580b000 r4:8580b000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580b000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583d2c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580b000 r7:00000000 r6:83018000 r5:00001000 r4:7f11f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca43000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586378c r4:85863400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586378c r4:858a8080 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580b000 r8:858a80ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8080 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8080 r8:8027ecf4 r7:ecbe9e60 r6:85493c80 r5:8580b000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:858a0700 INFO: task kworker/0:451:6155 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d72fc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r5:00001000 r4:ee619000 [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:6187 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:6187 tgid:6187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecc25d84 r8:00000002 r7:60000113 r6:ecc25d8c r5:8580d400 r4:8580d400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580d400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc25e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d32c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50f000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85863f8c r4:85863c00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85863f8c r4:858a8100 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580d400 r8:858a812c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8100 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8100 r8:8027ecf4 r7:ecbe9e60 r6:85493d00 r5:8580d400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:8583d800 INFO: task kworker/0:452:6187 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d72fc000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:6211 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:6211 tgid:6211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecb45d84 r8:00000002 r7:60000113 r6:ecb45d8c r5:8580e000 r4:8580e000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580e000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3580 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586c38c r4:8586c000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586c38c r4:858a8180 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580e000 r8:858a81ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8180 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8180 r8:8027ecf4 r7:ecbe9e60 r6:85493d80 r5:8580e000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d31c0 INFO: task kworker/0:453:6211 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d7cae000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:6212 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:6212 tgid:6212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbddd84 r8:00000002 r7:60000013 r6:ecbddd8c r5:85808c00 r4:85808c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85808c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbdde08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3e00 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85808c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6d1000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586df8c r4:8586dc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586df8c r4:858a8200 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808c00 r8:858a822c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8200 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8200 r8:8027ecf4 r7:ecb45e60 r6:85493e00 r5:85808c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbddfb0 to 0xecbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3240 INFO: task kworker/0:454:6212 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d7d89000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:6215 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:6215 tgid:6215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd31d84 r8:00000002 r7:60000113 r6:ecd31d8c r5:8580c800 r4:8580c800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8580c800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd31e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3680 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba89000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586c78c r4:8586c400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586c78c r4:858a8280 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580c800 r8:858a82ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8280 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8280 r8:8027ecf4 r7:ecbdde60 r6:85493e80 r5:8580c800 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd31fb0 to 0xecd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3400 INFO: task kworker/0:455:6215 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d8592000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:6217 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:6217 tgid:6217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd39d84 r8:00000002 r7:60000113 r6:ecd39d8c r5:85808000 r4:85808000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85808000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd39e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d37c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85808000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaef000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586cb8c r4:8586c800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586cb8c r4:858a8300 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808000 r8:858a832c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8300 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8300 r8:8027ecf4 r7:ecbdde60 r6:85493f00 r5:85808000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3480 INFO: task kworker/0:456:6217 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d8b8c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:6219 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:6219 tgid:6219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd41d84 r8:00000002 r7:60000113 r6:ecd41d8c r5:85803000 r4:85803000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85803000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3900 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85803000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb5d000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586cf8c r4:8586cc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586cf8c r4:858a8380 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85803000 r8:858a83ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8380 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8380 r8:8027ecf4 r7:ecbdde60 r6:85493f80 r5:85803000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3640 INFO: task kworker/0:457:6219 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d8f6a000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:6221 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:6221 tgid:6221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd49d84 r8:00000002 r7:60000113 r6:ecd49d8c r5:85806000 r4:85806000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85806000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3a40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85806000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586d38c r4:8586d000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586d38c r4:858a8400 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85806000 r8:858a842c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8400 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8400 r8:8027ecf4 r7:ecbdde60 r6:856c9000 r5:85806000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3780 INFO: task kworker/0:458:6221 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: d9960000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:6223 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd51d84 r8:00000002 r7:60000013 r6:ecd51d8c r5:85810c00 r4:85810c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85810c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3b80 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5fd000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586d78c r4:8586d400 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586d78c r4:858a8480 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810c00 r8:858a84ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8480 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8480 r8:8027ecf4 r7:ecbdde60 r6:856c9080 r5:85810c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856d3980 INFO: task kworker/0:459:6223 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: da026000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:460:6226 blocked for more than 478 seconds. r10:829189c0 r9:ecd5dd84 r8:00000002 r7:60000013 r6:ecd5dd8c r5:85810000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8586db8c r4:858a8500 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:6228 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:6228 tgid:6228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd61d84 r8:00000002 r7:60000013 r6:ecd61d8c r5:85811800 r4:85811800 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85811800 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd61e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc0c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85811800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586eb8c r4:8586e800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586eb8c r4:858a8580 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85811800 r8:858a85ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:856d3c80 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:462 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583d300 r5:8586e78c r4:8586e400 r4:858a8600 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0451d20 to 0xe0451d68) 1d20: dad15000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:6235 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:6235 tgid:6235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecbc1d84 r8:00000002 r7:60000113 r6:ecbc1d8c r5:85813c00 r4:85813c00 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85813c00 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc6c0 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8586f78c r4:858a8680 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:463:6235 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 r4:e0451dc0 r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 Exception stack(0xe0451fb0 to 0xe0451ff8) INFO: task kworker/0:464:6238 blocked for more than 478 seconds. r4:85814800 r5:85814800 r4:829189bc r4:00000000 r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:858a8700 r8:8027ecf4 r7:ecbc1e60 r6:856c9300 r5:85814800 INFO: task kworker/0:464:6238 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d60: 80070013 ffffffff r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee619000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8495ab8c r4:8495a800 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b73c00 r8:847a6cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:6239 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd71d84 r8:00000002 r7:60000113 r6:ecd71d8c r5:85815400 r4:85815400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85815400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd71e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc480 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85815400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8df000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586f38c r4:8586f000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586f38c r4:858a8780 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85815400 r8:858a87ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8780 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8780 r8:8027ecf4 r7:ecbc1e60 r6:856c9380 r5:85815400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd71fb0 to 0xecd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cc440 INFO: task kworker/0:465:6239 is blocked on a mutex likely owned by task kworker/1:208:3660. 1d20: dbc0c000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r4:e0451dc0 r5:00001000 r4:ee619000 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:466:6243 blocked for more than 479 seconds. r5:85816000 r4:829189bc [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r4:00000000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:858a8800 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: dbe8f000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r7:ddde2d40 r6:83018200 r5:8495ab8c r4:847a6c80 r4:847a6c80 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847a6c80 r8:8027ecf4 r7:e0449e60 r6:847a6d00 r5:84b73c00 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:84789140 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:6245 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:6245 tgid:6245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66b40>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a65bb8>] (__schedule) from [<81a66b40>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829189c0 r9:ecd7dd84 r8:00000002 r7:60000113 r6:ecd7dd8c r5:85812400 r4:85812400 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85812400 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd7de08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cca40 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85812400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8587038c r4:85870000 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8587038c r4:858a8880 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85812400 r8:858a88ac r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8880 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8880 r8:8027ecf4 r7:ecd6de60 r6:856c9480 r5:85812400 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:84b73c00 r7:00000000 r6:83018200 r5:00001000 r4:7f847000 r4:847a6c80 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:468:6247 blocked for more than 479 seconds. r10:829189c0 r9:ecd85d84 r8:00000002 r7:60000013 r6:ecd85d8c r5:85818000 r4:85818000 [<81a66b14>] (schedule) from [<81a66f28>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85818000 r4:829189bc [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a66f10>] (schedule_preempt_disabled) from [<81a6960c>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6930c>] (__mutex_lock.constprop.0) from [<81a69ad8>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1034) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 r4:00000000 [<81a69ac4>] (__mutex_lock_slowpath) from [<81a69b18>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a69adc>] (mutex_lock) from [<804e4fe4>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cc8c0 r4:00000000 [<804e8d68>] (vfree) from [<80549d40>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85818000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549d10>] (execmem_free) from [<803c6f10>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93b000 [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6f00>] (bpf_jit_free_exec) from [<803c72f0>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7288>] (bpf_jit_free) from [<803c8380>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586ff8c r4:8586fc00 [<803c8234>] (bpf_prog_free_deferred) from [<8027e2a8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8586ff8c r4:858a8900 [<8027e0f4>] (process_one_work) from [<8027eef0>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e0f4>] (process_one_work) from [<8027eef0>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85818000 r8:858a892c r7:82804d40 r6:dddced40 r5:dddced60 r4:858a8900 [<8027ecf4>] (worker_thread) from [<80285f1c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858a8900 r8:8027ecf4 r7:ecd7de60 r6:856c9500 r5:85818000 r4:00000001 [<80285df0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd85fb0 to 0xecd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285df0 r4:856cc640 INFO: task kworker/0:468:6247 is blocked on a mutex likely owned by task kworker/1:208:3660. task:kworker/1:208 state:R running task stack:0 pid:3660 tgid:3660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a65bb8>] (__schedule) from [<81a66f74>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:8280c9b4 r9:84b73c00 r8:80200be4 r7:e0451d54 r6:ffffffff r5:84b73c00 r4:00000000 [<81a66f34>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0451d20 to 0xe0451d68) 1d20: dc6f6000 dfdff000 00000001 80239b98 7f847000 00000001 82ac11c4 82ac05a0 1d40: 7f847000 dfdff000 8280c9b4 e0451d9c e0451da0 e0451d70 80230ad4 80239bb0 1d60: 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e4da8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4b24>] (__purge_vmap_area_lazy) from [<804e5160>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0451dc0 r5:e0451e08 r4:e0451dc0 [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4f7c>] (_vm_unmap_aliases) from [<804e8ed4>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d16e40 r4:00000000